Answer:
read only memory (ROM)
Explanation:
Examples of non-volatile memory include read-only memory (see ROM), flash memory, most types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.
Answer:
Algorithm C is chosen
Explanation:
<u>For Algorithm A </u>
T(n) = 5 * T ( n/2 ) + 0(n)
where : a = 5 , b = 2 , ∝ = 1
attached below is the remaining part of the solution
Answer:
b) one needs to follow through all phases, assessment, design, deploy and manage security
Explanation:
The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form
At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step
Therefore according to the given options, the second option is correct
Answer:
Explanation:
data is a statement like
data 10,20, 30 , 40 , 50, 60 , 70, 80
\\the numbers represent ages.
For x := 1 to end of data do a[x]:=read(data)
\\ This is a comment. You could do this much easier if you just use three if statements rather than the if then else.
minor:=0;adult:=0;senior:=0;
while a[x] <> 0 do begin
age:= a[x]
if age < 19 then minor:=minor + 1;
If age > 18 then if age < 65 the adult:=adult + 1;
if age > 64 then senior := senior + 1;
end;
I have not declared the variables anywhere. That depends on what language you are using. The key step you want are the three if statements. How you find out what's in them is another matter.