Answer: Spyware
Explanation:
Spyware is the software program that can collect information and data about certain organization, user, etc without their permission or knowledge. It can convert that information according to the desired way after obtaining information without consent.
If spyware is used for unauthorized and malicious purpose , it is usually present in the authorized system in hidden manner for stealing, passwords, data,confidential information etc.
Since both arrays are already sorted, that means that the first int of one of the arrays will be smaller than all the ints that come after it in the same array. We also know that if the first int of arr1 is smaller than the first int of arr2, then by the same logic, the first int of arr1 is smaller than all the ints in arr2 since arr2 is also sorted.
public static int[] merge(int[] arr1, int[] arr2) {
int i = 0; //current index of arr1
int j = 0; //current index of arr2
int[] result = new int[arr1.length+arr2.length]
while(i < arr1.length && j < arr2.length) {
result[i+j] = Math.min(arr1[i], arr2[j]);
if(arr1[i] < arr2[j]) {
i++;
} else {
j++;
}
}
boolean isArr1 = i+1 < arr1.length;
for(int index = isArr1 ? i : j; index < isArr1 ? arr1.length : arr2.length; index++) {
result[i+j+index] = isArr1 ? arr1[index] : arr2[index]
}
return result;
}
So this implementation is kind of confusing, but it's the first way I thought to do it so I ran with it. There is probably an easier way, but that's the beauty of programming.
A quick explanation:
We first loop through the arrays comparing the first elements of each array, adding whichever is the smallest to the result array. Each time we do so, we increment the index value (i or j) for the array that had the smaller number. Now the next time we are comparing the NEXT element in that array to the PREVIOUS element of the other array. We do this until we reach the end of either arr1 or arr2 so that we don't get an out of bounds exception.
The second step in our method is to tack on the remaining integers to the resulting array. We need to do this because when we reach the end of one array, there will still be at least one more integer in the other array. The boolean isArr1 is telling us whether arr1 is the array with leftovers. If so, we loop through the remaining indices of arr1 and add them to the result. Otherwise, we do the same for arr2. All of this is done using ternary operations to determine which array to use, but if we wanted to we could split the code into two for loops using an if statement.
So you know how much space you need
So that your website is organized and easy to navigate
So that you can know how much to charge your customer
Answer:
The answer is "Baseline document".
Explanation:
Yolanda prepares the Baseline document, in which each system shows in all its organization, that must satisfy a minimum level of security. This document is used to define as an official document, which has a from a first document.
- It is also known as the process of authorization and certification as intended to be used.
- This document is also known as a transition or reworking the certain files which have been approved formally.
Answer:
c. Buffer overflow
Explanation:
In Computer programming, buffer can be defined as an area of memory set aside specially and specifically for holding data or informations.
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as buffer overflow. This ultimately implies that, buffer overflow is the process of exceeding the storage capacity of a memory buffer with data, beyond the amount it is designed to hold and therefore overwrites any adjacent memory locations.
Buffer overflow attacks are becoming less common in modern operating systems because the modern operating system usually leaves a space between buffers and randomize the layout of memory through call mapping, as well as through the use of runtime protection.