import java.util.Scanner;
public class JavaApplication58 {
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.println("Enter a positive integer:");
String num = scan.nextLine();
for (int i = num.length()-1; i >=0; i--){
System.out.println(num.charAt(i));
}
}
}
I hope this helps!
is where the term ‘App’ comes from. It is any piece of software that allows us to actually ‘use’ the computer. For example, it may be a word processor, web browser, spreadsheet software or even just a game. Application software relates to the user rather than the hardware
There are two types of secondary memories.
- RAM
- ROM
RAM:
- RAM stands for random access memory .
- It is expandable.
- we can do multiple things in it.
- Its erasable.
ROM
- ROM stands for read only memory.
- It is permanent .
- We can only read in it.
- Its permanent hence not removable.
Answer:
denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)
Explanation:
Denial-of-service attack -
It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .
The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .
In case of the distributed denial-of-service attack , the flooding is done by many different sources .
Hence , from the given scenario of the question ,
The correct answer is denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .