Answer:
Following are the program to this question:
#include <iostream>//defining header file
using namespace std;
void OR_gate()//defining a method OR_gate
{
bool a,b;//defining bool vaiable
cin>>a>>b;//input value
if(a or b)//use if block to check condition
{
cout<<"1";//print message
}
}
int main()//defining main method
{
OR_gate();//calling method OR_gate
return 0;
}
Output:
0
1
1
Explanation:
In the above program, a method "OR_gate" is declared, and inside the method two bool variable "a and b" is defined, which input the value from the user end.
In the next step, an if block is defined, that uses the or gate to check input value and print the value that is equal to 1, and inside the main method, it call the "OR_gate" method.
Answer:
A bar code reader scanner captures the pattern in a barcode and sends it to the computer, where special software translates the pattern into meaningful data.
Explanation:
A barcode reader is a handheld device that captures and reads information that is contained in a bar code. It consists of a scanner, a decoder and a cable that connects the barcode reader into a computer. This scanner works by directing a beam or red light across the black and white elements of a barcode. This amount of light energy that is reflected back is measured and converted into electrical energy which is then converted into readable data by the decoder and forwarded to a computer.
Answer:
Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best
Explanation:
Circled plus sign adds another worksheet
Answer:
bring your own devices
Explanation:
"bring your own devices" paradigm is getting popular since organizations are increasingly allowing users to perform work tasks <em>on their own</em> personal devices, It is preferred because of the benefits and ease for the user. On the other hand, this paradigm opens several security risks.
For example processing sensitive data on personal devices creates risks in case of data recovery or if the device is stolen or lost.
Additionally, <em>control and monitoring</em> of organizational data is harder when users allowed to work on their personal devices. Thus <em>data leakage</em> and <em>public exposure</em> can happen more easily.