I will assume this is a windows computer
Answer:
- Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
- You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.
Explanation:
The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.
Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.
Explanation:
Following are the difference between overriding and overloading
(1) Method overloading means method having same name but different parameter or method signature Whereas Method overriding means method having same name and same parameter or signature.
(2) Method overloading is achieved the compile time Polymorphism whereas Method overriding is achieved the Run time Polymorphism .
(3 ) In method overriding child class have facility to provide a specific implementation of a method which is already defined by parent class method whereas there is no such facility is available in method overloading
(4 )Programming structure of method overloading
class test
{
void fun()
{
// statement
}
void fun(int b)
{
// statement
}
}
In this fun() method name is same but different signature I.e void fun() and void fun(int a);
Programming structure of method overriding
class parent
{
void fun()
{
// statement in parent class
}
}
class child extends test
{
void fun()
{
// override the statement in child class
}
}
In this fun() method have same name and same signature in both class
Answer:
Physical layer
Explanation:
The physical layer is responsible for the physical cable or wireless connection.