Answer:
abstract class Mark //Creating an Abstract class{
abstract double getPercentage();}
class A extends Mark{
double result;
A( int val1, int val2, int val3){
result=(val1+val2+val3)/3;}
double getPercentage(){
return result;}}
class B extends Mark{
double result;
B(int val1, int val2, int val3, int val4){
result=(val1+val2+val3+val4)/4;}
double getPercentage(){
return result;}}
class Main{
public static void main(String args[]){
//class A Object
Mark obj_1=new A(10,20,30);
System.out.println(obj_1.getPercentage());
//class B Object
Mark obj_2=new B(10,20,38,46);
System.out.println(obj_2.getPercentage());}}
Composition- a work of music, literature, or art
This is important because art helps people express oneself
Answer:
B. Bluetooth technology.
Explanation:
A hardware platform can be defined as a collection of hardware such as an input hardware and output hardware device that are compatible with each other and the software application or program to be executed. All hardware platforms have their respective low level or high level machine language that are compatible with the software application. Some examples of a hardware devices are speakers, monitor, x86, i860, keyboard, MIPS, scanner, central processing unit (CPU) video game consoles (joysticks), IBM Z, ARM, unisys, powerpc, SPARC etc.
Generally, all hardware devices are connected with one another through the use of a wire such as cables or wirelessly such as Bluetooth, infrared etc.
Hence, not all hardware is connected with wires, some hardware might be connected wirelessly with Bluetooth technology.
A Bluetooth technology can be defined as a wireless standard used for transmitting and receiving data over a short-range of distance. Therefore, the operating radio frequency of a Bluetooth technology is 2.45 Gigahertz and for a distance of about 10 meters (30 feet).
Answer:
Copy and paste the needed information from text editor to clipboard then to the web browser.
Explanation:
The keylogging software is an application that can connect to the keyboard API through software APIs or could be kernel based or hypervisor based, JavaScript based etc, to capture keyboard events.
It records these events which makes this tool useful for attackers in networks. So long as the clipboard logging or screen logging does not accompany the keyboard loggers, data can be copied on clipboard and pasted to the target point.