The goal of a postmortem is to draw meaningful conclusions to help you learn from your past successes and failures. Despite its grim-sounding name, a postmortem can be an extremely productive method of improving your development practices.
The cases that it affects which of the Information security requirements is explained below.
<h3>What are the Information security violations of the above cases?</h3>
Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.
If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,
If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.
learn more about confidentiality from
brainly.com/question/863709
Answer:
B. style=text-align: right
Explanation:
text-align is a CSS property having 5 types of values. Each of values define below.
left - Aligns content to left.
right - Aligns content to right.
center - Centers the content.
justify - Depends on the width of the content, it will align itself to both left and righ
inherit - It specifies the the value of text-align should be taken from parent element.
Answer:
Algorithm
1.Start.
2.Using an input function, ask the user to input the name and store the Entered Value in string variable.
3.Print value stored in String Variable.
4.End.
Flow chart: