Answer:
import java.util.Scanner;
public class num1 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter User name 1 and 2");
int userNum1 = in.nextInt();
int userNum2= in.nextInt();
if(userNum1<0){
System.out.println("userNum1 is negative.");
}
else if(userNum2>8){
userNum2 =0;
}
else{
System.out.println("userNum2 is less than or equal to 8..");
}
}
}
Explanation:
This is implemented in Java programming language
Using the scanner class, the user is prompted to enter two numbers
These are saved in the variable userNum1 and userNum2 respectively.
If, else if and else statements are then used according to the specifications given in the question.
Answer:
Answered below
Explanation:
Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.
Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.
Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
'use strict';
/**
* Alias for document.getElementById.
* @param {string} id The ID of the element to find.
* @return {HTMLElement} The found element or null if not found.
*/
function $(id) {
// eslint-disable-next-line no-restricted-properties
return document.getElementById(id);
}
/**
* Get the preferred language for UI localization. Represents Chrome's UI
Answer:
Definition:
Malware refers to the malicious electronic instructions ( programmes ) which copy and store themselves on the memory of the computer which destroys and halts the working condition of the computer.
Examples:
<em>→</em><em> </em><em>Trojanic</em><em> </em><em>bomb</em><em>.</em>
<em>→</em><em> </em><em>Memory</em><em> </em><em>bomb</em><em>.</em>
<em>→</em><em> </em><em>Polymorphic</em><em> </em><em>bomb</em><em>.</em>