Answer:
If a museum charges different prices based on the day of the week and age of the visitor. The pricing rules are shown below.
- On Tuesday and Thursday children 10 and under get in free ($ 0).
- For all other days and ages the cost is ten dollars ($ 10).
The code in python is;
if (day == 'Tuesday' or day == 'Thursday') and age <= 10:
price = 0
else:
price = 10
Explanation:
The logic of the algorithm suggests that that the conditional if-statement assigns zero to the price variable if the day variable is either Tuesday or Thursday and the child's age is 10 or below but assigns 10 to the price variable if the condition is not met.
Answer:
b. template<classT>.
Explanation:
Template functions are that can work with generic types. Template lets us to create a function so that more than 1 type or class can adapt the functionality of that function.
We can write the template function as following:-
template<class typename>.
It matches to the option b.
A calculator is slower and needs more human assistance
Answer: AWS CodeCommit
Explanation:
The AWS service that the developers can use to meet the requirements that are illustrated in the question is the AWS CodeCommit.
The AWS CodeCommit is refered to as a fully-managed source control service which can be used in the hosting of Git-based repositories which are secure.
AWS CodeCommit makes it easy for the collaboration on code for teams in a secure ecosystem. CodeCommit can securely store binaries, source code etc.
In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.
DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.
Unauthorized access – When an attacker has an illegal access to host machines
<u>Application Exploitation</u>
Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.
Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.
Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.