Answer:
create the integer variable and initialize it to one, with the do statement, increment the variable by one and print it, then the while statement checks if the variable is less than or equal to 10.
#include <iostream>
using namespace std;
int main(){
int i = 1;
do {
cout<< i << "\n";
i++;
}
while (i <= 10);
}
Explanation:
The C++ source code initializes the integer variable i to one and increments and print the value if the value is less than or equal to ten. The do-while statement executes a block of code before the condition is implemented.
Agreed to all the terms mentioned in the contract
Answer:
The answer is Upload bandwidth
Explanation:
Bandwidth refers to the highest transfer rate of data on an internet connection or network.
Upload bandwidth is the amount of data that moves from a computer to the internet or a network within a given amount of time. Documents, music files, video files, software and so on can be uploaded to the internet or a network.
Answer:
Tetris
Explanation:
On June 6, 1984, the first version of Tetris was unveiled and quickly took the world by storm. While Tetris has appeared on every major gaming platform from the Commodore 64 to the iPhone, it arguably gained its greatest notoriety as the cartridge game bundled with the original Nintendo Game Boy.
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.