Answer:
8 tips for cyber safety
1. Keep Personal Information Professional and Limited
2. Keep Your Privacy Settings On
3. Practice Safe Browsing
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
5. Be Careful What You Download
6. Choose Strong Passwords
7. Make Online Purchases From Secure Sites
8. Be Careful What You Post
8 STEPS TO STOP YOUR CHILD’S CYBERBULLY
Resist The Urge To Respond Or Retaliate
Document The Bullying
Get Help
Block The Bully
Keep Passwords Secret
Be A Teammate
Approach The Parents
Support Your Child With A Stress-Free, Supportive Home
Explanation:
Answer:
public class LabProgram {
public static void main(String[] args) {
System.out.println("Hello World!"); } }
Explanation:
In this statement: System.out.println
System is a class in JAVA language package
out is a member of class System
println() is a functionT to print or display message to a console or file
So the message to print here is Hello World!
Now this statement System.out.println prints the message "Hello World!" passed in the argument.
Hence this statement as a whole displays the message Hello World! on the output screen.
The available options are:
A. In the same folder
B. Where ever is fine
C. In different folders
Answer:
A. In the same folder
Explanation:
Given that a website normally has a folder that contains each pages, images and pictures. It is expected that a website administrator keep all the files of the website in a separate folder that can be easily accessed in situation where there is need to make any form of modification to the website from the back end.
Hence, the appropriate place a website administrator should save all items for the same website is "In the same folder"
Answer: Java Virtual Machine(JVM)
Explanation: In java,there is the process of the management of the memory by own self or automation , this is known as the garbage collection .The program in it compile to be executed by the java virtual machine(JVM).During this process , object get together in a sort of heap and then unnecessary object are detected which are of no use and delete them to make space for the memory . Therefore, garbage collection is carried out by java virtual machine(JVM).
Answer: Lattice-based, non-discretionary
Explanation: Lattice-based access control is a form of non-discretionary access control in which users are assigned a matrix of authorizations for particular areas of access. Lattice-based access control are usually used to restrict or define the level of authorization granted to a subject which may be an individual, organization or group or the that given to the object which may include applications and computers.It utilizes a non-discretionary approach whereby the defined access is uniformly enforced across all subjects and objects within the confines of an information system.