Answer:
Following are the program in c language
#include<stdio.h> // header file
int main() // main function
{
int ar[10],k,biggest; // variable declaration
printf("Enter the ten values:\n");
for (k = 0;k < 10; k++)
{
scanf("%d", &ar[k]); // user input of 10 number
}
biggest = ar[0]; // store the array index of 0 into biggest variable
for (k = 0; k< 10; k++) // finding the biggest number
{
if (ar[k] >biggest)
{
biggest = ar[k];
}
}
printf(" biggest num is %d", biggest); // display the biggest number
return 0;
}
Output:
Enter the ten values:
12
2
4
5
123
45
67
453
89
789
biggest num is 789
Explanation:
Here we declared an array ar[10] of type int which store the 10 integer values.
Taking 10 integer input from the user in array ar .After that iterating the loop and finding the biggest number by using if statement and store the biggest number in biggest variable .
Finally display biggest number.
There are six basic functions of IT.
1. Capture: Compiling detailed records of activities.
2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.
3. Generation: Organizing information into a useful form.
4. Storage: Retaining information for further use.
5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.
6. Transmission: Distributing information over a communication network.
Runs out of memory
has uninitialized variables
uses undefined behaviour
The reason that you have not been locked out after several failed PIN login attempts is that your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.
Technology known as Trusted Platform Module (TPM) is made to offer hardware-based, security-related functionality. Designed to perform cryptographic operations, a TPM chip is a safe crypto-processor. Malicious software cannot interfere with the TPM's security capabilities, and the chip has numerous physical security features to prevent tampering. Utilizing TPM technology has a number of major benefits, including the following:
- Cryptographic keys should be created, stored, and used sparingly.
- Utilize the burnt-in RSA key of the TPM to authenticate platform devices using TPM technology.
- By recording security metrics, you can assist in ensuring platform integrity.
To learn more about TPM click here:
brainly.com/question/10742732
#SPJ4