Answer:
The ouput of the given code is :
22
is "Tom's age.
Explanation:
Here in this code the variable user_name and user_age are initialized to "Tom" and 22 respectively as statement is given in the question i.e cout << user_age << " \nis " + user_name << "'s age.";.This line will print the user_age i.e 22 after that the control moves to the next line and print is "Tom's age.
Following are the code in c++
#include <iostream> // header file
#include <string>
using namespace std;
int main() // main function
{
string user_name="Tom";
int user_age= 22;
cout << user_age << " \nis " + user_name << "'s age.";
return 0;
}
Output:
22
is "Tom's age.
Answer:
The correct answer to the following question will be "Checksum".
Explanation:
A variable that reflects the amount of several bits in a transmitted packet and is used by practitioners of IT to spot heavy-level anomalies in the transmission of data, known as Checksum.
- After executing a cryptographic hashing algorithm each piece of information or a document could be allocated a value of checksum before delivery.
- We are relevant because we are using them to verify the authenticity of the documents.
So, it's the right answer.
Answer:
See explaination
Explanation:
2a)
A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.
2b)
If a foreign government launches a hacking attack, it can be considered a war.
If this type of attack happens then the repercussions may result to the war.
2c)
We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.
THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.
The weakness can be described as the loss which is being incurred by the company.
Answer:
layout, next page, continuous
Explanation:
just took it
To understand flow of programming logic flow chat technique been used. Once end user starts any learning programming flow chat design been learned and corrected the mistake. After success of flow chat design end user been advice to do programming and tested in computer.
<u>Explanation:</u>
In flow chart design is used for beginner level programming. Some time to make higher level managers to understand this flow chart design is used.
Flow chart has start, procedure, condition, function or procedure and end with stop diagrams.
Flow chart makes end user understand the flow of logics.
Suppose we need to do a process for a procedure, end user has to design with start flow chart symbol and put a procedure flow chart symbol with identification character, then end user has use same identification character and start designing the procedure in the flow chart diagram.
Procedure in flow char design is used to call same procedure number of time, so that repeated coding is avoided.