Data mining is the process in which large values of raw data are interpreted to extract something useful out of it. With the help of software, finding pattern using these large data is the main point.
Hope my answer would be a great help for you. If you have more questions feel free to ask here at Brainly.
Answer:
Following are the program in the C++ Programming Language.
#include <iostream>
using namespace std;
//define function for swapping
void SwapValues(int* userVal1,int* userVal2){
//set integer variable to store the value
int z = *userVal1;
//interchange their value
*userVal1 = *userVal2;
//interchange their value
*userVal2 = z;
}
//define main method
int main()
{
//declare variables
int x,y;
//get input from the user
cin>>x>>y;
//Call the method to swap the values
SwapValues(&x,&y);
//print their values
cout<<x<<" "<<y;
return 0;
}
<u>Output</u>:
3 8
8 3
Explanation:
<u>Following are the description of the program</u>.
- Firstly, we define required header file and function 'SwapValues()', pass two pointer type integer variables in argument that is 'userVal1' and 'userVal2'.
- Set integer data type variable 'z' and initialize the value of 'userVal1' in it, then initialize the value of 'userVal2' in 'userVal1' and then initialize the value of 'z' in 'userVal2'.
- Finally, define the main method in which we set two integer type variables and get input from the user in it then, call and pass those variables and print it.
Answer:
Option(d) is the correct answer to the given question .
Explanation:
There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.
- The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.
- The Option (b) is wrong because In the key scheduling we do not used the the random key for the encryption process .
- The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.
Answer:
four heads are better than one
Explanation: