Computational thinking inclines invokes the techniques of decomposition, latter reconstruction, abstraction & algorithms development
Trusting, loyal, and a hard worker. All indristies want employees who won't backstab, works hard, and is loyal to the company
// Variable to keep track of array size
int length = 0;
// Array itself
int array[] = {};
// while loop will take input in the array until a negative number is entered
while(input>=0){
stdin = new Scanner(System.in);
array[length] = stdin;
length +=1;
}
// int variable to terminate while loop
int i =0;
// keep track of index of output array
int y =0;
while(arr[i] != length){
// making output array
int output[]={}; bool flag;
// put the element in out put array considering if it the desired one
output[y] = array [i];
// Now check if it was the desired?
for(int z=1;z<=length;z++){
if(array[i+z]!=output[y]){
flag = true;
}
else
{
output[y]=0;
y+=1;
}
if(array[i+z+1]=output[y] && flag == true){
output[y] = array[i];
y+=1;
}
}
//output the array
for(int o=0;o<y;o++)
System.out.println(output[o];
Answer:
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.