Answer:
Algorithm for the above problem:
- Take a string from the user input.
- store the input string on any variable.
- Reverse the string and store it on the other variable.
- Compare both strings (character by character) using any loop.
- If all the character of the string matched then print that the "Input string is a palindrome".
- Otherwise, print "The inputted string is not a palindrome."
Output:
- If the user inputs "ababa", then it prints that the "Input string is palindrome"
- If the user inputs "ababaff", then it prints that the "Input string is not palindrome"
Explanation:
- The above-defined line is a set of an algorithm to check the number is palindrome or not.
- It is defined in English because the algorithm is a finite set of instructions written in any language used to solve the problem.
- The above algorithm takes input from the user, compare that string with its reverse and print palindrome, if the match is found.
Answer:
Name of Operating System: Ubuntu
Five legal file names:
inventory.txt
total.txt
NIKKAH.txt
Defaulter.txt
studenT.txt
Five illegal file names:
wel/come.txt
..
MY>note.txt
.
my<work.yxt
Explanation:
To fix the illegal name:
1. Remove the special character, so it becomes welcome.txt
2. Remove the double dot and rename using text characters
3. Remove the special character, so it becomes MYnote.txt
4. A file cannot be named using dot. So we rename to a textual name
5. Remove the special character, so it becomes mywork.txt
Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.
Increased inhibitions and a decreased likelihood that all members will contribute to the discussion is the following issues should NOT be expected when interacting with teammates via information technology
b. Increased inhibitions and a decreased likelihood that all members will contribute to the discussion.
<u>Explanation:</u>
In information technology, social behaviour will effect more powerful in industries. In digital medial those use mobile everybody is a media person, easily share the important to social media and sharing person doesn’t aware of the effect of sharing the information.
If a piece of information is received or send both the sender and receiver should be aware of the importance of information make sure it should not be shared outside the group members or the world.
Once import information shared outside the world it can stop any given point time.
Explanation: changing the coding and not the way it works.