counter = 1
sum = 0
while counter <= 6:
sum = sum + counter
counter = counter + 2
print(sum)
A. 12
B. 9
C. 7
D. 8
✔️ Correct! This loop executes 3 times. After the first loop sum = 1 and counter = 3, after the second loop sum = 4 and counter = 5, and after the third loop sum = 9 and counter = 7.
Answer:
The program is as follows:
#include <iostream>
#include <vector>
using namespace std;
int main(){
int n;
cout<<"Elements: ";
cin>>n;
vector <int>vectnum;
int numInp;
for (int i = 1; i <= n; i++){ cin>>numInp; vectnum.push_back(numInp); }
int big, secbig;
big = vectnum.at(0); secbig = vectnum.at(1);
if(vectnum.at(0)<vectnum.at(1)){ big = vectnum.at(1); secbig = vectnum.at(0); }
for (int i = 2; i< n ; i ++) {
if (vectnum.at(i) > big) {
secbig = big;;
big = vectnum.at(i);
}
else if (vectnum.at(i) > secbig && vectnum.at(i) != big) {
secbig = vectnum.at(i);
}
}
cout<<"Second Largest: "<<secbig<<endl;
int small, secsmall;
small = vectnum.at(1); secsmall = vectnum.at(0);
if(vectnum.at(0)<vectnum.at(1)){ small = vectnum.at(0); secsmall = vectnum.at(1); }
for(int i=0; i<n; i++) {
if(small>vectnum.at(i)) {
secsmall = small;
small = vectnum.at(i); }
else if(vectnum.at(i) < secsmall){
secsmall = vectnum.at(i); } }
cout<<"Second Smallest: "<<secsmall;
return 0;
}
Explanation:
See attachment for explanation
Answer:
Common Internet File System
Explanation:
Given that the Server Message Block (SMB) has various types or variations. The most common variation of this Server Message Block sharing protocol that is considered to be a dialect of SMB is known as "Common Internet File System." This is known to serve as a form of a communication protocol for giving shared access to different outlets between nodes on a network.
Hence, in this case, the correct answer is "Common Internet File System"
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.
1981 access to the ARPANET was expanded.
Answer:
a. backdoor
backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.