Answer:
Replace /* Your code goes here */ with
for(i =0; i<NUM_VALS; i++)
{
printf("%d", origList[i]*offsetAmount[i]);
printf(";");
}
Explanation:
The first line is an iteration statement iterates from 0 till the last element in origList and offsetAmount
for(i =0; i<NUM_VALS; i++)
{
This line calculates and print the product of element in origList and its corresponding element in offsetAmount
printf("%d", origList[i]*offsetAmount[i]);
This line prints a semicolon after the product has been calculated and printed
printf(";");
Iteration ends here
}
Answer:
Growth Strategy
Explanation:
A growth strategy is a plan of action that allows you to achieve a higher level of market share than you currently have. Such as the case in the question, PC's shifted so sales and service of Laptops and PCs because there is a greater market share for them there than where they currently operate from.
Answer:
The above code print the text at three times.
Explanation:
- It is because the above code has one loop which executes three times. The loop executes for the value of i = 0,1 and 10.
- when the value of i is 0 then "++i" will increase the value 1 and the text will be printed.
- If the value of i=1, then the value of i is 2 in the second iteration and the again the text is printed, then the if condition gives the true result and the value of i will be 10.
- Then the loop executes for the last time when the value of i is 10.Then the value will be 11 because of the increment operator and the text will be printed for the third time.
- Then the while loop is not true for the 11 value of i and the loop will get terminated.
Answer:
True
Explanation:
Java and some other object oriented programs makes use of the command line arguments. This enables one to pass additional information to a program when it is run. whatever information that is passed to the program at the command line argument will accompany the program when is it run and java stores this information as an array of strings.
Answer:
metasploit.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.
Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.