Answer:
Following are the code in java language
abstract interface PointingDevice // interface PointingDevice,
{
// abstract method getXCoord()
public abstract int getXCoord();
// abstract method getYCoord()
public abstract int getYCoord();
// abstract method attentionRequired()
public abstract boolean attentionRequired();
// abstract method setResolution( )
public abstract double setResolution(double a);
}
Explanation:
In this code we have declared a abstract interface "PointingDevice" which contains the four abstract method getXCoord of type int , getYCoord() of type int , attentionRequired() of type boolean and setResolution() of type double .
These method have only declaration not definition any interface or class which inherit the inteface PointingDevice must define all these four method otherwise it also be abstract .
Answer:
The data can be safeguarded using key escrow procedure.
Explanation:
Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.
Answer:
True
Explanation:
<em>IP Address</em>: It is used to uniquely identify each device over the network.
A. Since it tells about how people think she’s lesser because she’s a women.