No. social media makes people share too much information about their personal lives.
Answer:
True
Explanation:
Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.
Rootkit tools:
1. Keyloggers
2. antivirus disablers
3. password stealers
4. banking credential stealers
5. bots for DDoS attacks
You can set soft or hard quotas on file shares per user or per group. This would limit how much space a user can take up.
Answer:
String chessboard[][]=new String[6][6];
Explanation:
This is the declaration of a string 2-D array in java.
String is the data type of the variable.
chessboard is the name of the variable.
6 is the size of the 2-D array.
new is the keyword for allocating space to array.
Answer:
C. 7200 bps.
Explanation:
In networking, transmission lines or connectors and ports operates at a specific speed based on the port type and the cable or medium of transmission.
Baud rate is a concept in digital information technology that defines the rate of symbol per channel during transmission. The bit or data rate is the number of bits transfered in a link per second.
The relationship between baud rate and bit rate is;
Bit rate = baud rate x number of symbol bit level
To get the bit rate of a 2400 baud signal with symbol level = 8 = 2^3
Bit rate = 2400 x 3. = 7200 bps.