Answer:
loop
Explanation:
Loop is the one which is used to execute the specific statement again and again until the condition is true.
In the programming, there are 3 basic loop used.
1. for loop
<u>Syntax:</u>
for(initialization, condition, increment/decrement)
{
statement;
}
the above statement execute until the condition in the for loop true when it goes to false, the loop will terminate.
2. while loop
<u>Syntax:</u>
initialization;
while(condition)
{
statement;
increment/decrement;
}
it is work same as for loop and the increment/decrement can be write after or before the statement.
3. do while
syntax:
initialization;
do
{
statement;
increment/decrement;
}while(condition);
here, the statement execute first then, it check the condition is true or not.
so, if the condition is false it execute the statement one time. this is different with other loops.
Answer:
If you are on Windows 10, all you need to do is to right-click on the desktop, and finally select the "Display Settings". And over there you will be able to view various attached displays, and the resolution that you require is going to be exactly here, and as an example, the best resolution for your monitor is 3840 x 2160.
Explanation:
Please check the answer section.
Explanation:
a . Regular language -
Uses are as follows -
- matching the regular expression patterns , like the Unix grep .
- patterns search and replace operations .
- programming languages for the Lexical analysis in the compilation phase .
b. Context Free Language -
Uses are as follows -
- match the count of one symbol with another symbol .
- Match a symbol with another symbol .
- submit one symbol with string made of other symbols recursively .
c. NP-Completeness -
Uses are as follows -
- used for Weighted Model Counting
- Used for Integer Programming
- used for Boolean Satisfiability testing
d. Decidability -
Uses are as follows -
- Team games with incomplete information are undecidable.
- Infinite chess (with limitations on rules and game pieces) is decidable.
Answer:
D. Data exfiltration
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.
The type of attack in this scenario is best described as data exfiltration.
Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.
Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.