Answer:
void printBackwards(char s[])
{
int n=strlen(s)-1;//finding the last index of the string..
for(int i=n;i>=0;i--)//loop to print the string backwards..
{
printf("%c",s[i]);//printing the character of the string..
}
}
Output:-
abcdefg
gfedcba
Explanation:
I have used strlen function that will be used after including the string.h header file.It returns the length of the string.After finding the last index I have iterated over the c string in reverse order and printing the character of the string one by one.
The answer is True
It
intentionally or unintentionally compromises a system by making unauthorized changes
to data. As compared to intentional changes which are usually malicious, unintentional
changes are normally accidental. Changes and modifications to the system
configurations can also compromise integrity. Such modifications might include
deleting, changing, and creating information in a network resource.
It is best to implement mechanisms on how one can track and audit such changes as they happen
False I believe probably false
Answer:
The answer to this question is a. Event log
Explanation:
Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.
Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.
Answer:
It is called a WPS brutal force attack.
Explanation:
Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).
WPS is used to connect to a network without passphrase, but with a key combination or a PIN.
Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.