Answer:
The answer is "Option d".
Explanation:
In the above-given code, two-class is defined that is "employee and manager", in which the first class "employee" defines two variables that are "name, id". In this name is pointer type character and id is a long type variable.
In the second class "manager" one variable "rank" and the employee object is created. In this class, the rank variable is a pointer type character, and outside this class, a reference "x" is created.
In this code, we use both class object that uses the "employee" class variable that is id to hold value in it.
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// function to compute sum and product
void square(int input)
{
// variable to store the square of number
long long squ_num;
calculate the square of number
squ_num=pow(input,2);
// print the output
cout<<"square of "<< input<<" is: "<<squ_num<<endl;
}
// driver function
int main()
{
int n;
// read the number until user enter 0
do{
cout<<"enter a number!! (0 to stop):";
// read the input from user
cin>>n;
// call the function to calculate square of input number
square(n);
}while(n!=0);
return 0;
}
Explanation:
Declare a variable "n" to read the input number from user.Call the function square() with parameter "n".In this function, it will calculate the square of the input number and print it.This will repeat until user enter 0 as input.Program will ends when user give 0 as input.
Output:
enter a number!! (0 to stop):5
square of 5 is: 25
enter a number!! (0 to stop):7
square of 7 is: 49
enter a number!! (0 to stop):11
square of 11 is: 121
enter a number!! (0 to stop):0
Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.
<h3>The types of
threat actors.</h3>
In cybersecurity, there are different types of threat actors and these include the following:
One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.
Read more on cybersecurity here: brainly.com/question/14286078
#SPJ1