Answer:
Pay attention in your class.
Explanation:
If you paid attention in your class, you would have at least a basic understanding of the material.
Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.
Answer:
Answered below.
Explanation:
The three general methods consist of unicasting, broadcasting and multicasting.
Casting implies the transfer of data from one computer (sender) to another (recipient).
Unicasting is the transfer of data from a single sender to a single recipient.
Broadcasting deals with the transfer of data from one sender to many recipients.
Multicasting defines the transfer of data from more than one sender to more than one recipients.
Answer:
import java.io.*;
import java.util.Scanner;
class divide {
public static void main (String[] args) {
Scanner num=new Scanner(System.in);//scanner object.
int userNum=num.nextInt();
while(userNum>1)//while loop.
{
userNum/=2;//dividing the userNum.
System.out.print(userNum+" ");//printing the userNum.
}
}
}
Input:-
40
Output:-
20 10 5 2 1
Input:-
2
Output:-
1
Input:-
0
Output:-
No Output
Input:-
-1
Output:-
No Output.
Explanation:
In the program While loop is used.In the while loop it divides the userNum by 2 in each iteration and prints the value of userNum.The inputs and corresponding outputs are written in the answer.