Answer:
series
Explanation:
The Kconfig related tools as well as the source code mainly resides under the scripts or kconfig or in the kernel source. The configuration file is a series of the menu entries, in which every line starts with some keyword.
It is a selection based configuration system that is developed by Linux kernel.
The Kconfic entries should be made in series point after point.
Answer:
The code to this question can be given as:
Code:
public interface Test
{
public abstract Duration getDuration();
public abstract Result check(int ar);
public abstract double getScore();
}
Explanation:
An interface is similar to Java Class, and it has only static variables and abstract methods. Java uses a multi-inheritance interface. Many Java interfaces can be implemented by a Java class. All methodologies were implicitly public and abstract within an interface.
In the given question we a function that is "Test" and inside the interface, we define three functions that are defined as:
- First, we declare a "getDuration" method that returns the Duration object.
- Second, we declare a "check" method that accepts an integer variable that is "a".
- Third, we declare a "getScore" method that returns a double value.
Answer and Explanation:
IP CCTV:
New dangers are acquainted with the security world as frameworks move from conventional simple to IP organize empowered frameworks especially in video reconnaissance. Web Protocol (IP) give an open stage to incorporation at the information level of various security and life wellbeing gadgets and applications.
Pros: of IP CCTV :
- Lower starting expense: Harnessing the IT framework decreases establishment costs in cabling, related control and electrical plugs.
- Gives adaptability and versatility
- Higher security and versatility
- The tight programming joining between frameworks make them progressively canny and diminishes security holes, accelerate the reaction time.
Cons of IP CCTV
- It rotates around system security and programmers danger.
- The hazard increments if camera is gets to from the portable or telephone.
- The hazard increments if camera is gets to from the portable or telephone.
Answer: Rootkit
Explanation: Rootkit is the software that helps in carrying out malicious attack by giving the permission to unauthorized user for accessing the system. This software comes with numerous tools for attacking the restricted and confidential information and resources of the system such as password stealers, key-loggers , antivirus disabling tool etc.
Network defender can lose trust when rootkit software gets into the operating system because it gives complete control for privileged accessing the system to the attacker .The detection and elimination of rootkit is also a difficult task.
Other options are incorrect because worm is malware that copies and spreads from one computer system to other. Trojan provides the unauthorized access of attacker in the system and can infect system but cannot be highly harmful as rootkit. Exploit is a code that enters the system to provide access to cyber-criminals but it can be detected .
Thus ,the correct option is rootkit.