Answer:
#include <iostream>
#include <cstring>
using namespace std;
void replacePeriod(char* phrase) {
int i = 0;
while(*(phrase + i) != '\0')
{
if(*(phrase + i) == '.')
*(phrase + i) = '!';
i++;
}
}
int main() {
const int STRING_SIZE = 50;
char sentence[STRING_SIZE];
strcpy(sentence, "Hello. I'm Miley. Nice to meet you.");
replacePeriod(sentence);
cout << "Updated sentence: " << endl;
cout << sentence << endl;
return 0;
}
Explanation:
- Create a function called replacePeriod that takes a pointer of type char as a parameter.
- Loop through the end of phrase, check if phrase has a period and then replace it with a sign of exclamation.
- Inside the main function, define the sentence and pass it as an argument to the replacePeriod function.
- Finally display the updated sentence.
Answer:
There is no hesitation at all that the company is going through recession, and will for next 10 years. Hence, we need to be crystal clear with our budget for this company, and provide low cost solutions. The company requires trouble ticket system. The simplest can be a back-end service to store trouble ticket details, and with API like ticket check, cancellation on fraud and many such. However, the company can select the most important from this list as well, and leave the remaining, as software company is going to charge for this. Also. we can build a simple app for the company with APIs that we developed with good design, and we can make use of web socket programming to ensure client server communication, and data transfer. We can make use of the chatbots as well, and that is the cheapest definitely currently.
Explanation:
The answer is self explanatory.
Answer:
Honeytoken
Explanation:
Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.
Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.
Answer:
I believe it is ‘A’
Explanation:
The Format Painter feature copies only the formatting from one selected text to another. The content and text of the selection will not be copied using Format Painter.