Answer:
All are True
Explanation:
a. A constructor must have the same name as that of a class. For example
public class MyFirstClass{ // this is the class name
public MyFirstClass() } // the constructor having the same name as class.
b. Constructors never have a return type not even void because it is only used to initialize the values of data members of the class when the object of the class is created so constructors are not directly called hence they do not need to have a return type.
c. Constructors are invoked using the new operator.
When the new object is created the constructor is invoked in order to initialize the variables of a class. The memory is allocated to the object and then the constructive is invoked for the purpose to initialize the object.
Answer:
the branch of mathematics concerned with the analysis of strategies for dealing with competitive situations where the outcome of a participant's choice of action depends critically on the actions of other participants
Explanation:
In simple terms Game theory is the study of how and why people make decisions.
What are you trying to ask...
Answer: Explanation:
Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.
For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions. So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".
By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.
In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.