Answer:
// here is code in c++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main() {
// variable
int num;
int tot_sum=0;
cout<<"enter a number: ";
// read the value of n
cin>>num;
// check the multiple of 2 or 5 from 1 to n
for(int x=1;x<=num;x++)
{
// if multiple of 2 or 5 then add them
if(x%2==0 ||x%5==0)
{
tot_sum=tot_sum+x;
}
}
// print the sum
cout<<"sum of multiple of 2 or 5 is:"<<tot_sum<<endl;
return 0;
}
Explanation:
Read the number "n" from user.Check every number from 1 to n, if it is a multiple of 2 or 5 then add them to "tot_sum".When the for loop end, "tot_sum" will have sum of all the number which are either multiple of 2 or 5.Print the sum.
Output:
enter a number:11
sum of multiple of 2 or 5 is:35
Answer:
Explanation:
Based on the information provided in this scenario it can be said that this is likely due to there being a cultural lag between having the Internet and using the technology to its full capacity. Cultural lag refers to the notion that culture takes time to catch up with technological innovations, mainly due to not everyone has access to the new technology. As years pass a specific technological advancement becomes more readily accessible to the wider public as is thus more widely adopted.
Answer:
A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN encrypts a frame with its own VPN key.
Explanation:
The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.
Answer:
The advantage of the simulated link strategy are:
- It is easily able to provide the practical feedback to the customers and users while designing the whole system. It also determine the efficiency and the correctness of the design in the stimulated link strategy.
- In the stimulated link strategy, the sharing and delivering of the data and information is done efficiently without any occurrence of error and interrupt. It is also high flexible technique.
The disadvantage of the simulated link strategy are:
- The simulated link strategy is flexible but it is not standardization and also it required more good concept.
- This technique is expensive and it is not readily available as it always require validation process.
Hacking would be a widespread problem.