Answer:
Following are the program in c language
#include <stdio.h> // header file
int main() // main method
{
char name[90]="mantasa"; // storing name
char add[90]="120 lal bangla mumbai"; // storing address
printf("\n Name:%s\nAddress:%s",name,add); // print name and address
return 0;
}
Output:
Name:mantasa
Address:120 lal bangla mumba
Explanation:
In this program we are declaring the two array of char type which will store the name and address . after that we display name and address.
Answer
TRUE
Explanation
A computer virus is a self-replicating program which are malicious and are designed to infect and gain control over a computer without the owner's knowledge.
To protect your computer from viruses especially when downloading files from the internet, it is advisable for one to perform regular windows security updates. This is because because windows have malware definitions to its windows defender and security essential utilities.
public class MyClass {
public static void main(String args[]) {
int x = 1;
int total = 0;
for (int i = 1; i <= 10; i++){
x *= i;
total += x;
}
System.out.println(total);
}
}
This program finds the sum of that series to the tenth term, the sum is: 4037913. I hope this helps.
Answer:
1. True
2. True
3. False
4. False
Explanation:
1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.
The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.
Hence, it helps to ensure that data can be modified only by appropriate mechanism.
2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.
3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.
4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.
Answer:
I don't think so. In today's computer era, many different solution directions exist for any given problem. Where OOP used to be the doctrine of choice, now you would consider it only when the problem at hand fits an object-oriented solution.
Reason 1: When your problem can be decomposed in many different classes with each many instances, that expose complex interactions, then an OO modeling is justified. These problems typically produce messy results in other paradigms.
Reason 2: The use of OO design patterns provides a standardized approach to problems, making a solution understandable not only for the creator, but also for the maintainer of code. There are many OO design patterns.