Answer:
we need PLC(Programmable Logic Units) attached to the sensors and those sensors will take the signals/values and transfer them to the cloud .In cloud we store that information and send that information to the web application where user is able to view
Explanation:
it looks like a SCADA system. we can integrate PLC with SCADA
or
for developing PLC we can use c or c++.it contain logic to transfer data to cloud
for cloud storage we can use Microsoft azure which is useful for data storage in sql servers
for web application we can use ASP.Net to interact with cloud and get data from there and display the results to the user on UI
Answer:
import java.util.Scanner;
import java.lang.*;
class Main
{
public static void main(String args[])
{
int n;
//For capturing the value of n
Scanner scanner = new Scanner(System.in);
System.out.println("Enter the value of n:");
//The entered value is stored in the var n
n = scanner.nextInt();
int k=1;
printnum(n,k);
}
public static void printnum(int n,int k)
{
if(n%2==0)
{
for(int i=k;i<=n-1;i=i+2)
{
System.out.print(i);
}
System.out.println("");
}
else
{
for(int i=k;i<=n-1;i=i+2)
{
System.out.print(i);
}
System.out.println("");
}
n--;
if(n<=1)
{
System.exit(0);
}
else
{
printnum(n,k+1);
}
}
}
Explanation:
The program is self explanatory.
Answer:
for ( initialization; condition;increment)
{
code goes here;
}
in python:
for i in list/range:
code with proper indentation
By initialization above we mean, like int i=0; etc.
By condition like i<10;
and by increment it means like i++, ++i or i+=1; etc
And in python, i can be an integer value if the range is mentioned, and it can be an item of a list if the list is used. We can also use an array, string and various other data structures in python. like we can have characters in a string and so on.
Explanation:
Please check the answer section.
Answer:
The correct answer to the following question will be "Data-in-use".
Explanation:
- Data-in-use is an IT term referring to active information that is usually preserved in a semi-persistent physical state in RAM of computer, CPU registers or caches.
- It might be created, modified or changed, deleted or accessed via different endpoints of the interface. This is indeed a useful term for IT departments to pursue institutional defense.
Therefore, it's the right answer.