<u> C++ Program to Print Pascal's Triangle</u>
#include<iostream>
//header file
using namespace std;
//driver function
int main()
{
int r;/*declaring r for Number of rows*/
cout << "Enter the number of rows : ";
cin >> r;
cout << endl;
for (int a = 0; a < r; a++)
{
int value = 1;
for (int b = 1; b < (r - a); b++)
/*Printing the indentation space*/
{
cout << " ";
}
for (int c = 0; c <= a; c++)
/*Finding value of binomial coefficient*/
{
cout << " " << value;
value = value * (a - c) / (c + 1);
}
cout << endl << endl;
}
cout << endl;
return 0;
}
<u>Output</u>
<u>Enter the number of rows : 5</u>
1
1 1
1 2 1
1 3 3 1
1 4 6 4 1
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.
Answer:
A.
Some image resolution was lost while uploading it
As she uploaded them on her website not downloading as choice B&D show while E is false and C is rarely occur
Answer:
-19/32
Explanation:
(If I assume d to be x)
4x+3/8=-2
or,4x=-2-3/8=-19/8
or,x=(-19/8)*(1/4)=-19/32
Answer:
D. Identify the problem.
Explanation:
There are six steps or stages in computer system troubleshooting. They are,
1. Identify the problem: In the stage of troubleshooting, the user is interviewed to get a description of the problem. Reproducing the problem is essential to confirm the described problem of the system before moving to the next stage.
2. Establish a theory of probable cause: when the problem is identified, a list of the possible cause of the problem is made.
3. Test the theory to determine a cause: each items on the list of possible cause of the problem is tested to confirm its actual cause.
4. Resolve the problem.
5. Verify full system functionality
6. Document the findings, actions and outcomes.