Answer:
Select File > Automatic Replies.
Select Send automatic replies.
If you don't want the messages to go out right away, select Only send during this time range.
Choose the dates and times you'd like to set your automatic reply for.
Type in a message.
Select OK.
Explanation:
Answer:
import java.util.Scanner;
public class num9 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter year");
int givenYear =in.nextInt();
if(givenYear>=2101){
System.out.println("Distant Future");
}
else if(givenYear>=2001){
System.out.println("21st Century");
}
}
}
Explanation:
- Using Java programming Language
- Import Scanner class to receive user input of the variable givenYear
- Use if statement to check the first condition if(givenYear>=2101)
- Use else if statement to check the second condition if(givenYear>=2001)
- print Distant future and 21st century respectively
Answer:
a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files
Explanation:
Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.
Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.
Here are my definitions of each option:
Spam = Unwanted mail, advertisements, etc
Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft
Malware = Usually a malicious piece of code that can be used to slow down your computer or to get a hold of your computer for some other malicious reason
Legitimate = Means that the sender is valid, you know who its coming from, and you know that you won't get attacked by the email
So based on this, I would say that the answer is B. Phishing
1: Application
2: Presentation
3:Session
4: Transport
5:Network
6: Data link
7: Physical
Application is a Interface Layer and responsible Layer
<span />