Answer:
mutator, accessor
Explanation:
Set methods are commonly called mutator methods, and get methods are commonly called accessor methods.
This is because set methods are used to mutate the state of a variable. Get methods, on the other hand are used to access the current state of the variable.
For example:
class Demo{
//Member variable
private int var;
//Accessor method
public int getVar(){
return var;
}
//Mutator method
public void setVar(int value){
var=value;
}
}
Answer:
Explanation:
The following code is written in Python and creates a function called create_sentence which takes in 2 parameters which are the number of spaces and the number of stars. Then it uses these values to create the sentence and return it.
def create_sentence(spaces, stars):
sentence = ""
for x in range(spaces):
sentence += " "
for x in range(stars):
sentence += "★"
sentence += "\n"
return sentence
Answer: Do my school work and do workouts you found on the internet
Explanation: double task
Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.
Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".
Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.
Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.
Answer:
a. quantum computing and telecommunications
Explanation:
Both quantum computing and telecommunications need materials with specific optical, electrical, and magnetic properties to advance, and nanotechnologies open the opportunity for nanomaterial with incredible properties. From antennas with special magnetic properties to faster optical fiber from more stable material to store qubits to super thermal insulators, nanotechnologies will change the way we build and design telecommunication systems, and it will allow us to build stable and reliable quantum computers.