Another one is iMovie which allows you to edit and cut things.
Answer:
Following are the program in c language
#include<stdio.h> // header file
int main() // main function
{
int ar[10],k,biggest; // variable declaration
printf("Enter the ten values:\n");
for (k = 0;k < 10; k++)
{
scanf("%d", &ar[k]); // user input of 10 number
}
biggest = ar[0]; // store the array index of 0 into biggest variable
for (k = 0; k< 10; k++) // finding the biggest number
{
if (ar[k] >biggest)
{
biggest = ar[k];
}
}
printf(" biggest num is %d", biggest); // display the biggest number
return 0;
}
Output:
Enter the ten values:
12
2
4
5
123
45
67
453
89
789
biggest num is 789
Explanation:
Here we declared an array ar[10] of type int which store the 10 integer values.
Taking 10 integer input from the user in array ar .After that iterating the loop and finding the biggest number by using if statement and store the biggest number in biggest variable .
Finally display biggest number.
Hi, the photo doesn’t show the question on what to answer, all I see are empt boxes, if you message me the question I will answer it for you!
Answer:
1. DLL Files.
2. System software repair.
3. Software configuration.
4. Human-computer interaction.
5. A graphical user interface (GUI).
Explanation:
1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.
2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.
3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.
4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.
5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.
Answer:
The answer is Letter D. Dumpster diving.
Explanation:
This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.
It is important to inform that the dumpster diving it is not limited to searching through the trash for obvious treasures like acess codes or passwords written down on sticky notes.