Answer:
Here is the script:
function dd = functionDMS(dd)
prompt= 'Enter angle in DD form ';
dd = input(prompt)
while (~checknum(dd))
if ~checknum(dd)
error('Enter valid input ');
end
dd = input(prompt)
end
degrees = int(dd)
minutes = int(dd - degrees)
seconds = ( dd - degrees - minutes / 60 ) * 3600
print degrees
print minutes
print seconds
print dd
Explanation:
The script prompts the user to enter an angle in decimal degree (DD) form. Next it stores that input in dd. The while loop condition checks that input is in valid form. If the input is not valid then it displays the message: Enter valid input. If the input is valid then the program converts the input dd into degrees, minutes and seconds form. In order to compute degrees the whole number part of input value dd is used. In order to compute the minutes, the value of degrees is subtracted from value of dd. The other way is to multiply remaining decimal by 60 and then use whole number part of the answer as minutes. In order to compute seconds subtract dd , degrees and minutes values and divide the answer by 60 and multiply the entire result with 3600. At the end the values of degrees minutes and seconds are printed. In MATLAB there is also a function used to convert decimal degrees to degrees minutes and seconds representation. This function is degrees2dms.
Another method to convert dd into dms is:
data = "Enter value of dd"
dd = input(data)
degrees = fix(dd);
minutes = dd - degrees;
seconds = (dd-degrees-minutes/60) *3600;
I think the answer is save as
The type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.
<h3>What is replay attacks in security?</h3>
A replay attack is known to be a kind of security attack that is known to be done if or when a cybercriminal is said to spy on a secure network communication.
Note that by this, they tend to intercepts the message and then they can fraudulently delays or as well as resends it to misdirect the receiver into carrying out the thing that the hacker wants.
Hence, The type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.
learn more about digital data from
brainly.com/question/28346439
#SPJ1
Explanation:
General purpose registers are the registers which you can use for data manipulation. They donot have specific purpose. ... If you put data in them the functionalities in the microcontroller or processor will change. For example, TMOD is a special purpose register
hope it helps you