Answer:
FALSE
Explanation:
The exit function is used to terminate or halt the process.
Syntax-
void exit(int status)
Exit function (exit()) can be used in any function not only main() and it will terminate your whole process.
<u></u>
<u>Example-</u> C Program
#include<stdio.h>
#include <stdlib.h>
// function declaration
float exitexample ( float x );
// Driver program
int main( )
{
float a, b ;
printf ( "\nEnter some number for finding square \n");
scanf ( "%f", &a ) ;
// function call
b = exitexample ( a ) ;
printf ( "\nSquare of the given number %f is %f",a,b );
/*This will not printed as exit function is in exitexample() function*/
}
float exitexample ( float x ) // function definition
{
exit(0); //exit function
float p ;
p = x * x ;
return ( p ) ;
}
Answer:
DNS poisoning
Explanation:
This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.
Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.
Explanation: