Answer:
import java.io.*;
public class Larger {
public static void main(String[] args) throws IOException{
BufferedReader br=new BufferedReader(new InputStreamReader(System.in));// reading input from buffered reader
int a,max=-99999,i;
for(i=1;i<=5;i++)
{
a=Integer.parseInt(br.readLine());//converting string input string to int
if(a >max)
max=a;
}
System.out.println("Maximum value : "+max);
}
Explanation:
Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
Answer:
c. selection list.
Explanation:
A selection list is created using the select and option elements that present users with a group of predefined possible values for the data field.
In Computer programming, the selection list is used to avail the end users with the ability to engage in an operation such as a predefined possible values for the data field.
Answer:
Encapsulation is an example of variables