Answer:
type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
Explanation its malware
import java.util.*;
public class myClass {
public static void main(String args[]) {
Scanner scan = new Scanner(System.in);
System.out.print("Input a String: ");
String str = scan.nextLine();
System.out.print("Input an integer: ");
int num = scan.nextInt();
for(int i=str.length()-1; i>=0; i--) {
for(int j=0; j<num; j++) {
System.out.print(str.charAt(i));
}
}
}
}
Answer:
HURRY
Dr. Khan works for the marketing department of a company that manufactures mechanical toy dogs. Dr. Khan has been asked to assess the effectiveness of a new advertising campaign that is designed to be most persuasive to people with a certain personality profile. She brought four groups of participants to the lab to watch the video advertisements and to measure the likelihood that they would purchase the toy, both before and after watching the ad. The results of Dr. Khan’s study are presented below.
Part A
Explain how each of the following concepts applies to Dr. Khan’s research.
Survey
Dependent variable
Big Five theory of personality
Part B
Explain the limitations of Dr. Khan’s study based on the research method used.
Explain what Dr. Khan’s research hypothesis most likely was.
Part C
Use the graph to answer the following questions.
How did the trait of agreeableness affect how people responded to the new ad campaign?
How did the trait of conscientiousness affect how people responded to the new ad campaign?
A parallel port is a a connection in which eight data lines transmit an entire byte of data at one moment in time.
Table1/2.....hope it helps