Answer:
go to gogle
Explanation:
do it it giv ansewr better xd
Answer:
Following are the code in the C language .
int max(int x) // function definition
{
static int largest=0; // variable declaration
if (x>largest) // checking the condition
largest=x; // assign the value of input in the largest variable
return largest; // return the largest number
}
Explanation:
Following are the description of code .
- Decalred a function max of int type which hold a parameter x of int datatype.
- In this function compared the number x with the largest .If this condition is true then largest number hold the value of x variable
- Finally return the largest number .
The unit which is capable of mimicking the processor and of taking over control of the system bus just like a processor is: C) direct memory access.
<h3>What is computer memory?</h3>
A computer memory can be defined as the available space on an electronic device that is typically used for the storage of data or any computer related information.
<h3>What is a CPU?</h3>
CPU is an abbreviation for central processing unit and it can be defined as the main components of a computer because it acts as the “brain” of a computer and does all the processing, calculations, and logical control.
In Computer technology, direct memory access simply refers to the unit which is capable of mimicking the computer's processor and taking over control of the system bus just like a processor.
Read more on processing unit here: brainly.com/question/5430107
#SPJ1
Complete Question:
The __________ unit is capable of mimicking the processor and of taking over control of the system bus just like a processor.
A) interrupt-driven I/O
B) I/O channel
C) direct memory access
D) programmed I/O
The type of attack was most likely attempted against the application is an XSS attack.
<h3>Why is the above an XSS attack?</h3>
This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.
Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.
Learn more about attack from
brainly.com/question/76529
#SPJ1
Idk what language so this is java
int count_occurrences(String a, String b) {
int count = 0;
for(int i =0; iif(a.charAt(i) == b.charAt(0)) {
count++;
}
}
return count;
}