Its know as a virus (a program created to spread and maliciously harm computers)
Answer:
public void printAttitude(int n){
if(n == 1){
System.out.println("disagree");
}
else if(n == 2){
System.out.println("no option");
}
else if(n == 3){
System.out.println("agree");
}
else {
}
}
Explanation:
The above code has been written using Java syntax. The first line denotes the method header which contains the access modifier(public), followed by the return type(void), followed by the name of the method(printAttitude). The method name is followed by a pair of parentheses in which the parameter to the method is written - in this case - an int parameter, n.
Note: When a method does not return a value. It has a return type of void as shown on the first line of the code.
In the method body, a nested if...else statement is written to test for the value of the parameter. If the parameter value of n is 1, the string "disagree" is printed to the console. Else if the parameter value of n is 2, the string "no option" is printed to the console. if the parameter value of n is 3, the string "agree" is printed to the console. For other values of n, nothing is printed. This is shown in the body of the else statement.
Hope this helps!
Tell them the benefits of having account with ge explain the ends and outs of the company and why you think this company is the best suited to them
Answer:
See explaination
Explanation:
We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.
The listed and explained below are some of the threats;
a) Compromised browser:-
Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.
Phishing:-
Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .
Poisoned websites:-
These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.
Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .
These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.
K- 1 x 2 =2
OH- 1 x 2 = 2
Cu- 2
(CIO3)- 6
K- 1 x 2= 2
OH- 2
Cu- 2
(CIO3)- 3 x2=6
2KOH+ Cu(CIO3)2 - 2KCIO3+ Cu(OH)2