&x[i-1] + sizeof (int)
x + sizeof (int) * i
x+i
none of these
Two
Eight
Twenty
Theoratically no limit. The only practical limits are memory size and compilers
Constant expressions are evaluated at compile
String constants can be concatenated at compile time
Size of array should be known at compile time
All of these
True
False
both (a) and (b)
security model is based on the notion of user accounts
creates a security access token that includes the security ID for users
NT operates with client server model
all of these
grappling hook program
main program
determine how and when the problem occurred
what amount of damage was done
when security has been violated
one program
two programs
three programs
simply records the time
user
type of all access to an object
threat monitoring
audit log