Answer:
Following is given the required program. All the steps are described by comments. The sample output for the program is also attached.
I hope it will help you!
Explanation:
charles babbage is the father of computer's
Answer:
Explanation:
#include <iostream>
using namespace std;
int main ()
{
int responses[30],count[6];
int score = 0;
string resp = " ";
for (int i = 0; i < 30; i++)
{
responses[i] = 0;
}
for (int i = 0; i < 6; i++)
{
count[i,1]=0;
count[i,2]=0;
count[i,0]=0;
}
while ((resp != "Y") && (resp != "y"))
{
for (int i = 0; i < 30; i++)
{
while ((score > 5) || (score < 1))
{
cout << "Student " << (i+1)<< " please enter a value (1-5):";
cin >> score;
}
responses[i] = score;
if((score > 5)||(score<1))
{
if(score==1) count[1]++;
if(score==2) count[2]++;
if(score==3) count[3]++;
if(score==4) count[4]++;
if(score==5) count[5]++;
}
score = 0;
}
cout<< "Response Frequency Percentage"<<endl;;
cout<< " 1 "<<count[1]<<" "<<(count[1]/30)<<"%"<<endl;
cout<< " 2 "<<count[2]<<" "<<(count[2]/30)<<"%"<<endl;
cout<< " 3 "<<count[3]<<" "<<(count[3]/30)<<"%"<<endl;
cout<< " 4 "<<count[4]<<" "<<(count[4]/30)<<"%"<<endl;
cout<< " 5 "<<count[5]<<" "<<(count[5]/30)<<"%"<<endl;
cout<< "Do you want to exit? Press Y to exit any other key to continue: ";
cin>> resp;
}
return 0;
}
Pc
hope this helps have a good day
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.