Answer:
#include<iostream>
#include <vector>
#include <list>
using namespace std;
int main(){
int a[10]={0,1,2,3, 4, 5, 6, 7, 8, 9 };
std::vector<int> v (&a[0],&a[0]+10);
std::list<int> l (&a[0],&a[0]+10);
int b[10];
for(int i=0;i<10;i++){
b[i]=a[i];
}
std::vector<int> v2(v);
std::list<int> l2(l);
for(int i=0;i<10;i++){
b[i]+=2;
}
for(int i=0;i<10;i++){
v2[i]+=3;
}
for (std::list<int>::iterator it = l2.begin(); it != l2.end(); it++)
*it=*it+5;
cout<<"Each containers value are: "<<endl;
cout<<"1st array: "<<endl;
for(int i=0;i<10;i++){
cout<<a[i]<<" ";
}
cout<<"\n 1st vector: \n";
for(int i=0;i<10;i++){
cout<<v[i]<<" ";
}
cout<<"\n 1st List is:\n";
for (std::list<int>::iterator it = l.begin(); it != l.end(); it++)
cout << *it << ' ';
cout<<"\n 2nd array: "<<endl;
for(int i=0;i<10;i++){
cout<<b[i]<<" ";
}
cout<<"\n 2nd vector:\n";
for(int i=0;i<10;i++){
cout<<v2[i]<<" ";
}
cout<<"\n 2nd list:\n";
for (std::list<int>::iterator it = l2.begin(); it != l2.end(); it++)
cout << *it << ' ';
return 0;
}
Explanation:
- Initialize an array, a vector and a list of type integer
.
- Create a 2nd array, vector, and list as a copy of the first array, vector, and list.
- Increase the value of each element in the array by 2
, vector by 3 and list by 5.
- Finally display the relevant results.
Answer:
Find answers below.
Explanation:
Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.
Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.
Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.
Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.
In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
It is True because we can create the text file, move it around and rename it, although there is no option for deletion so it is better to put it in another folder.
Answer:
provide (a book or article) with citations of sources of information.
"each chapter is referenced, citing literature up to 1990"