Answer:
/*
* Program to print traingle using asterisk.
*/
#include<iostream>
using namespace std;
//Function to print n asterisk in a row.
void printAsterisk(int n)
{
for(int i = 0;i<n;i++)
cout<<"*";
}
int main()
{
//Variable to store size of trianle
int size;
cout<<"Enter the size of triangle"<<endl;
cin>>size;
//print asterik in increasing order line by line.
for(int i =0; i<size;i++)
{
printAsterisk(i);
cout<<endl;
}
//print asterik in decresing order line by line.
for(int i =size-1; i>0;i--)
{
printAsterisk(i-1);
cout<<endl;
}
}
Output:
Enter the size of triangle
10
*
**
***
****
*****
******
*******
********
*********
********
*******
******
*****
****
***
**
*
Explanation:
Since no programming language is mentioned therefore answer is provided in C++.
The above program will use two for loops to print the triangle using asterisk.
The first loop will print the asterisk line by line with each line having one more asterisk than the previous one till the size of the triangle.
The second for loop will print the asterisk using same logic as above but in reverse order.
Final output of triangle will be obtained.
Answer: D)XBRL(eXtensible Business Reporting Language)
Explanation: XBRL(eXtensible Business Reporting Language) is the type of XML(eXtensible Markup Language) that is used for the improvement in the transparency between the recipient and the business organization regarding the accessibility of the financial information.
The financial data is formatted uniformally so that the user can get the knowledge about the finance through the online sources like internet.
Other options are incorrect because HTML and XML are the markup languages but not for the financial area and PDF file is the file that stores data.Thus correct option is option(D).
Answer:
disk caching
Explanation:
Hi,
Magnetic hard drives use disk caching to speed up performance. This method is quite ingenious because what it does is that in a section of memory in your pc, it keeps a copy of information that was previously accessed in the hard disk. So, next time if the same data is requested, the system can refer to cache to get quick access rather than going to the hard disk (which is slower).
Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)
<h3>What is Phishing?</h3>
Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.
To avoid phishing attacks, make sure you:
- understand what a phishing scheme looks like
- Please do not click on that link.
- Get anti-phishing add-ons for free.
- Don't provide your information to an untrusted website.
- Regularly change passwords.
- Don't disregard those updates.
- Set up firewalls.
- Don't give in to those pop-ups.
Learn more about Phishing:
brainly.com/question/23021587
#SPJ1
Full Question:
Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.
Which of the following security threats does this describe?
- Trojan
- Phishing
- Man-in-the-middle
- Zero-day attack
Answer:
The answers are "Option a, Option b, Option d, and Option c".
Explanation:
- The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
- The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
- Leaders generally fully involve one or even more workers in design buildings.
- 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.