Answer:
A lot is wrong with the program given in the question. See the corrected version below:
<em>public class ANot {</em>
<em> public static void main(String[] args) {</em>
<em> int a, b, c;</em>
<em> //Three integers</em>
<em> a = 3; b = 4; c = a + b;</em>
<em> System.out.println("The value of c is " + c);</em>
<em> }</em>
<em>}</em>
Explanation:
Errors:
1. The main method had a semi colon after it. This is wrong
2. An open brace was supposed to follow the main method
3. The declaration of the variables was supposed to end with a semi colon
4. the correct comment style is // and not \\
5. Initialization of variables was supposed to end with semi colons
6. The output statement had C and not c which is the declared and initialized variable..Java is strictly typed
7. Open and closing braces for the class and method wrongly placed
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The question is about writing a C program that prints the initial letter of Name Ferdous.
Therefore, below is the given complete code that prints the first letter of the name Ferdous.
<em>#include <stdio.h> </em><em>/*import strandard input/output library*/</em>
<em>#include<string.h></em><em> /*import string library to handle string type of data*/</em>
<em> </em>
<em>int main(void) </em><em> /*started the program execution- program entry point*/</em>
<em>{ </em>
<em>char *str = "Firdous";</em><em> /*char to pointer str contains string "Firdous"*/</em>
<em>int len = strlen(str); </em><em> /*this line of code is not neccary, but if you print other character for example last character of the name then you can use it*/</em>
<em>printf("First Letter of the name is: %c", str[0]); </em><em> /*print first letter of the name*/</em>
<em>} </em><em> /**program terminated*/</em>
Answer:
Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only
Explanation:
- XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
- This involves sending server side scripts which are executed by the user and these may even change the html pages too.
- Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
- This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
- In this type of attack, the attacker tries to inject the code remotely.
- Option (c) is correct and options (a),(b) and (d) are wrong options.
Answer:
Explained below.
Explanation:
- The interest of the carriers has it's major focus on the process of getting funds from both individual customers and corporate entities that run the websites. However, the interest of websites’ has it's major focus on the process of generating funds in form of subscriptions or funds gotten from paid adverts from both individual customers and corporate entities.
- In terms of value chain perspectives; the websites experience far more pressure to keep fresh and exciting features and services on their platform while carriers don't experience that but only experience having to compete with innovations being done by their existing competitors to remain leaders in the field.
Answer:
RAID 1 is the redundant storage configuration
Explanation: