Answer:
The program written in C++ is as follows'
#include<iostream>
using namespace std;
int main()
{
string names[3];
cout<<"Please enter three names: "<<endl;
for (int i = 0; i< 3;i++)
{
cin>>names[i];
}
for (int i = 2; i>= 0;i--)
{
cout<<names[i]<<endl;
}
return 0;
}
Explanation:
This line declares an array for 3 elements
string names[3];
This line prompts user for three names
cout<<"Please enter three names: "<<endl;
This following iteration lets user input the three names
for (int i = 0; i< 3;i++) { cin>>names[i]; }
The following iteration prints the three names in reverse order
for (int i = 2; i>= 0;i--) { cout<<names[i]<<endl; }
Answer: as a whale attack
Explanation:
A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.
Based on the explanation above, the attack called into is a whale attack.
Answer:
True they do. mark brainliest.!!!!! please
Explanation:
In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.
<h3>Should a person use certificate pinning?</h3>
Mobile applications are known to be one that often make use of certificate or also public key pinning so that they can be able to make sure that communications are secure.
Hence it is one that is often implemented if the developer of the application is said to be require to validate the remote host's identity or if operating in a harsh environment.
Hence, Certificate pinning hinders which certificates are considered valid for a any kind of website, and as such, In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.
Learn more about certificate from
brainly.com/question/1874937
#SPJ1