Answer:
The answer to this question is given below in the explanation section.
Explanation:
This program is written in C++.
#include <iostream>
using namespace std;
int main()
{
string word;// variable for taking user input
int cond;// to set condition true if user preses the stop and exit from loop
cout<<"Enter word: \n";
cin>>word;
do// start while loop
{
if(word=="stop" || word =="STOP" || word == "Stop")// if user enter word stop, then program exit
{
cond=0;
}
else//otherwise loop continue
{
cout<<" You Entered "+ word +"\n";
cout<<"Enter word: \n";
cin>>word;
cond=1;
}
}
while(cond == 1);// if user don't enter word "stop" loop run continuesly.
cout<<"Program exit";
return 0;
}
Answer:
Fair use
Explanation:
I don't know if this is correct but Its the best option.
The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.
<h3>What is DNS poisoning?</h3>
In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.
Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.
Learn more about hacker from
brainly.com/question/24956493
Answer:
The best answer is "D"
server needs ddr4 memory and ddr3 is installed.
Explanation:
Installing ddr4 memory and ddr3 on the server will not allow the server to recognize all of the memory installed at the same time. This will help the technician for the installation one at a time.
Answer:When you highlight changes as you work, Excel outlines any revisions (such as changes, insertions, and deletions) with a highlighting color. On the Review tab, click Track Changes, and then click Highlight Changes. Select the Track changes while editing. This also shares your workbook check box.
Explanation: