Your anwser will be the last one
Answer:
1. True 2. False 3. True 4. True 5. True 6. False 7. True
Explanation:
1. A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.
2. Activists are people who campaign to bring about a positive political or social change.
3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.
4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.
5. Yes, intruders have a common attack methodology.
6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.
7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.
Answer:
public class Leo{
public String method1(){
return "Jack 1 Leo 1";
}
public String method2(){
return "Don 2 Jack 2";
}
public String method3(){
return "Jack 3 Leo 3 Don 2";
}
public String toString(){
return "Jack 3 Leo 1"
}
}
public class Jack extends Leo{
}
Explanation:
Leo is the parent class and jack inherits all of its attributes from Leo
So when you call the following code in the main method:
Jack j = new Jack();
System.out.println(j.method1);
it should print Jack 1 Leo 1
This is because the program first checks if method 1 exists in the Jack class
Because it doesn't exist it then goes to the parent class which is Leo.
And in the Leo class method1 displays "Jack 1 Leo 1 "
So it prints that
Answer:
Search Engine
Explanation:
A search engine is used to crawl most of the web sites based on there content (mostly defined in metadata tag in web pages) in order to search information according to the given query submitted by user. Search Engine will then provides a list of matched results that user want to find.