1.
#include <iostream>#include <string>
using namespace std;
int main(){ string chars; // This is where we will put our @ signs and print them for(int x=0;x < 5; x++){
chars = chars + '@'; // This will concatenate an @ sign at the end of the variable cout << chars << "\n"; }}
2.
#include <iostream>#include <string>
using namespace std;
int main(){ string name; // Our variable to store the name cout << "What is your name? \n"; // Asks the user for their name cin >> name; cout << "\nWell, hello " << name << "!";}
3.
#include <iostream>#include <string>
using namespace std;
int main(){ int number; // Our variable cout << "Enter a number\n"; // Asks for a number cin >> number; cout << "You entered " << number << "%!";}
4.
#include <iostream>#include <string>
using namespace std;
int main(){ int number; // Our variable cout << "Enter a number\n"; cin >> number;
int check = number % 2; // The modulo operator (the percent sign) gets the remainder of the quotient if (check == 0) { cout << number << " is even!"; // If the remainder is 0 then it prints out "x is even" } else { cout << number << " is odd!"; // If the remainder is not 0 then it prints out "x is odd" }}
5.
#include <iostream>#include <string>
using namespace std;
int main(){ float r; // Our variable cout << "Enter a radius\n"; cin >> r; if (r < 0){ cout << "Lol. No."; // If the radius is less than zero print out that message } float circumference=2*3.14*r; float area=r*r*3.14; cout << "\n\n Circumference of circle: " << circumference; cout << "\n Area of circle: " << area;}
Answer:d) Mono-alphabetic substitution rules
Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.
Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.
Answer: TRUE
Explanation: Composite is simply used to refer to the existence of more than one event or pattern. The composite primary key as related to database management query refers to the synergy or combination of more than one field or column of a specified table which is used in sorting or accurate identification of a record. When attributes are combined, that is more than one, it assists in narrowing down the returned records such that records which are close and exclusive to the options specified are returned. Usually, the more the number of columns which makes uo the case mpoaite keys, the more unique and well sorted our returned output is.