Answer:
A) virus signature
Explanation:
Antivirus databases contain what are called signatures, a virus signature is a continuous sequence of bytes that is common for a certain malware sample.
--
Encryption is a way of scrambling data so that only authorized parties can understand the information.
I think a video to post to your website would be very good
Answer:
The program to this question can be given as:
Program:
#include<iostream> //header file
using namespace std;
int main() //main method
{
int x[10],i,largest = 0,second_largest=0,n; //variable
cout << "Enter Number of elements :"; //message
cin>>n;
cout << "Insert array elements :"; //message
for(i=0;i<n;i++) //insert elements in array
{
cin >>x[i];
}
//Finding Largest element
for(i=0;i<n;i++)
{
if (x[i]>largest)
{
largest = x[i];
}
}
//finding second largset element
for(i=0;i<n;i++)
{
if (x[i]>second_largest)
{
if(x[i]==largest)
{
continue; //Ignoring largest in order to get second largest
}
second_largest=x[i];
}
}
//print value
cout <<"Largest Number:"<<largest<<endl;
cout <<"Second Largest Number:"<<second_largest;
return 0;
}
Output:
Enter Number of elements :5
Insert array elements :33
45
75
87
23
Largest Number:87
Second Largest Number:75
Explanation:
In the above program firstly we define the header file then we define the main method in the main method we define the array and other variables. We first input the number for the size of the array. Then we insert array elements after inserting array elements we search the largest number and the second largest number in the array. To search the largest number in the array we use the loop. To search the first largest number we define a condition that array is greater than the largest number and store the value into the largest variable. Then we check the second largest number in the array for this we use two conditions that are array is greater than the second largest number in this we use another condition that is array is equal to the largest number. If the inner condition is true then it will move forward and end of an inner condition. In the outer condition, the value will be stored on the second_largest variable all the conditions will be done inner the loop. At the last we print values.
Answer:
The correct answer is "Technical Feasibility".
Explanation:
System investigation is used to Review that whether the system is feasible or not for the proposal that they will design or creating.in the system investigation stage, we do the technical feasibility. The technical feasibility is used to check technical resources like hardware, software, etc in the organization.
The Technical Feasibility in the System investigation is used to solve the problem of business
The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.
Explanation:
- Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
- To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
- A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.