I LIKE IT DO YOU ALSO LOVE IIT
public static void main()
{
String s = Console.ReadLine();
int len = s.length();
Char startletter = s[0];
Char endletter = s[len-1];
string midletter = ‘’;
if(len % 2 ==0)
midletter = s[len/2] + s[(len/2) +1]
else
midletter = s[len/2];
Console.WriteLine(startletter + midletter + endletter);
}
Here the logic is that, startletter is obtained using the index ‘0’, the last letter is obtained by calculating the “length of the string” and subtract 1 to get the “last index” of the given string.
Middle letter is calculated by first finding whether the given string length is “odd or even” and based on that index(es) are identified.
Answer:
Type of traffic carried in the next layer
Explanation:
Ethernet II can be regarded as standard protocol, it allows capturing.
It should be noted that in the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark had determined that the Type of traffic carried in the next layer
was IPv4 multicast
Answer: Java Virtual Machine(JVM)
Explanation: In java,there is the process of the management of the memory by own self or automation , this is known as the garbage collection .The program in it compile to be executed by the java virtual machine(JVM).During this process , object get together in a sort of heap and then unnecessary object are detected which are of no use and delete them to make space for the memory . Therefore, garbage collection is carried out by java virtual machine(JVM).
Answer: Computers as target
Explanation:
Whenever an authorized access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.