Answer:
// name of the package
package stringlength;
// Scanner is imported but it is not needed
// So it is commented
// import java.util.Scanner;
// The class name StringLength is defined
public class StringLength {
// main method to signify the beginning of program execution
public static void main(String[] args) {
// if-statement to check if argument is supplied to
// command line
if(args.length > -1) {
// the first argument is read and assigned to input
String input = args[0];
int length = input.length(); // using length() method in String class
System.out.println("Your string has a length of "+length+" characters.");
} else {
System.out.println("Please enter your string argument in quote");
}
}
}
Explanation:
The code works fine with little modification and comments. The user should supply the string arguments in quote. The quote must surround the strings because our logic read the first argument passed to the command line. Inserting a string with space between them will provide a wrong output.
A sample image is attached.
Answer:
User roles and access authorization
(Explanation of this question is given below in the explanation section.
Explanation:
As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.
The following problem can be with that account
- Unauthorized user access and privileges
The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.
- The firewall may be disabled to detect the malicious script
The firewall should be enabled to detect such types of attack from unauthorized access to the system
May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.
It usually is marked either with a sticker or sometimes with a stenciled mark like something.
a network card is a device which usually connects a computer to a network (LAN). A computer has two categories which make it a computer:
Hardware
Software
A network Card is from the Hardware part of the computer.
What are the exact numbers