Answer:
#include <iostream>
using namespace std;
int main()
{
string s;
cin>>s; //reading string
int i,j;
bool has_dups=false;
int n= s.length();
for(i=0;i<n;i++) //to check for duplicate characters
{
for(j=0;j<n;j++)
{
if(j!=i && s[i]==s[j]) //to check if it is matched with itself
{
has_dups=true; //if true no need to check others
break;
}
}
}
cout<<has_dups;
return 0;
}
OUTPUT :
California
1
Explanation:
Above program finds if a character repeat itself in the string entered by user.
Answer:
Management is not that easy. And at each level of the work environment, we need it. Suppose Mary works under an editor, and as a writer. Then She will be provided by editor a certain set of rights, that she requires to accomplish her work. And the chief editor who heads the editor, and who might be the administrator has nothing to do with this. And thus this will ensure that the chief editor or the administrator can accomplish other works during this time. And this will certainly save time, of the whole team. And its a rule in management, that only those rights are provided, that are required by the worker, and like in case of Mary.
Explanation:
Please check the answer section.
Answer:
c)1e6f28
Explanation:
The integer pointer intpoint2 points to the address 1e6f24.On increasing the inpoint.The intpoint will point to next location and since we know that the memory taken by integers is 4bytes.So the pointer will move to the next location 4 bytes ahead.
1e6f24+4=1e6f28.
Hence the answer is option c.
<u>Answer:</u>
<em>In a cross-site request forgery, browser </em><u><em>Link</em></u><em> help send a forged HTTP request.</em>
<u>Explanation</u>:
<em>CSRF is a kind of attack which compels the user to click on the unwanted links </em>or make him to perform some actions on the browser which the user is not intended to do so.
<em>They mainly target on Change request such as fund transfers, modifying their mail id’s etc</em>.
So they do all things by knowing Social engineering tricks and transfer the control of the <em>user to one another application created by the hackers and obtain the information and it is not just for theft of data.
</em>
The true statements are TRUE about web services protocols are:
- SOAP and REST are both web service communication protocols
- REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP .
<h3>Are SOAP and REST both Web service communication protocols?</h3>
Yes, SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) are both known to be a kind of web service communication protocols.
Note that REST gives room form a greater scope of data formats, but SOAP only allows XML and as such, The true statements are TRUE about web services protocols are:
- SOAP and REST are both web service communication protocols
- REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP .
Learn more about web services from
brainly.com/question/13261383
#SPJ1