Answer:
- numberRed = numberBlue = FALSE
- numberBlue > numberGreen = FALSE
- numberGreen < numberRed = FALSE
- numberBlue = wordBlue = ILLEGAL
- numberGreen = "Green" = FALSE
- wordRed = "Red" = FALSE
- wordBlue = "Blue" = FALSE
- numberRed <= numberGreen = TRUE
- numberBlue >= 200 = TRUE
- numberGreen >= numberRed + numberBlue = TRUE
- numberRed > numberBlue AND numberBlue < numberGreen = FALSE
- numberRed = 100 OR numberRed > numberBlue = TRUE
- numberGreen < 10 OR numberBlue > 10 = FALSE
- numberBlue = 30 AND numberGreen = 300 OR numberRed = 200 = FALSE
Explanation:
THESE RESULTS ARE VERIFIRED.....
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int x=5,y=2,z=9;
int min;
// find the smallest value and assign to min
// if x is smallest
if(x < y && x < z)
// assign x to min
min=x;
// if y is smallest
else if(y < z)
// assign y to min
min=y;
// if z is smallest
else
// assign z to min
min=z;
// print the smallest
cout<<"smallest value is:"<<min<<endl;
return 0;
}
Explanation:
Declare and initialize variables x=5,y=2 and z=9.Then check if x is less than y and x is less than z, assign value of x to variable "min" .Else if value of y is less than value of z then smallest value is y, assign value of y to "min".Else z will be the smallest value, assign its value to "min".
Output:
smallest value is:2
Answer:
B
Explanation:
The form feed character code is defined as 12 (0xC inbhexademical), and may be represented as control+L or^L. In a related use, control+L can be used to clear the screen in Unix shells such as bash. In the C programming language ( and other languages derived from C ), the form feed character is represented as '\f'.
Answer:
The correct answer is (a) Remove the affected servers from the network.
Explanation:
Solution:
Now, since the organisation top priority is more of containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.
Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.