Answer:
Written in C++
#include<iostream>
using namespace std;
int main()
{
const float SALES_TAX = 0.06625;
int total = 1000;
cout<<"Total: ";
cin>>total;
float grand_total = 0;
grand_total = total + total * SALES_TAX;
if (grand_total <= 1000)
{
cout<<"Grand total is less than or equal to 1000 it is $";
printf("%.2f", grand_total);
}
else if (grand_total > 1000 && grand_total <= 2000 )
{
cout<<"Grand total is more than 1000 less than or equal to 2000 it is $";
printf("%.2f", grand_total);
}
else
{
cout<<"Grand total is greater than 2000 it is $";
printf("%.2f", grand_total);
}
cout<<"\nProgram finished!";
return 0;
}
Explanation:
<em>I've added the full source code as an attachment where I use comments to explain difficult lines</em>
Amigo o amiga q está haciendo esto no c que seg oficia y lo siento
Answer:
C. Social Engineering
Explanation:
Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.
Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.
Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.
Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.
Answer:
Following is given the code with all necessary descriptions as comments in it. The output is also attached under the code. I hope it will help you!
Explanation:
Answer:
The best reading techniques are the SQ3R technique, skimming, scanning, active reading, detailed reading, and structure-proposition-evaluation.
Explanation: