1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
4 years ago
15

To use files in a c++ program you must include the ________ header file.

Computers and Technology
1 answer:
Arte-miy333 [17]4 years ago
3 0
To use files in a c++ program you must include the fstream header file. There are specific codes needed to be included to let the program perform specific functions on the computer. One has to remember the correct<span> headers that are used to run the operation you want smoothly.</span>
You might be interested in
What are the objects in object-oriented programming language?
VMariaS [17]

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

hope it helps ya mate.

5 0
3 years ago
Match each item with a statement below. a.Authentication b.Brute force attack c.Dictionary attack d.Password e.Shoulder surfing
Lana71 [14]

The steps that ensure that the individual is who he or she claims to be

a. Authentication  

Authentication is a process that provides proof that the user is genuine and not an imposter. It is a way to prove that you are allowed to access a system. Usernames and Passwords have been the default method of authentication. These days though, passwords are not the only authentication mechanism.

A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file

b. Brute force attack  

An automated brute force attack involves repetitive successive attempts of password guesses by using a trial and error approach and hoping to guess the encryption correctly. It is an old attack method, but is still in effect and popular with hackers. It can take minutes to crack or an eternity. Using automated brute force attacks tools and programs, and attacker is able to enter parameters such as password length, character set, pattern, language, and skips for the type of password to be generated

A password attack that compares common dictionary words against those in a stolen password file.

c. Dictionary attack  

A dictionary attack is another common offline password attack that begins with the attacker creating encrypted versions of common dictionary words and then compares these words against those in a stolen password file. This is sometimes very successful because users create passwords that are simple English dictionary words. A variation of such an attack is the hybrid attack.

A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows.

d. Password  

Nowadays, when accessing almost any computer device, systems, or a website, we are typically required to provide information that identifies and proves that we are actually that person. This is done by the use of passwords. Despite passwords being the primary means of authentication, they are no longer considered to be a strong defense against attackers.

Viewing information that is entered by another person

e. Shoulder surfing  

An example of shoulder surfing is observing someone entering a code from a keypad while standing from a short distance. Another good example is a hotel room’s cipher lock. Cipher locks are vulnerable to shoulder surfing. Someone passing by from behind is able to see the buttons being pushed and can easily gain access when you leave.

Grouping individuals and organizations into clusters based on an affiliation  

f. Social networking and not social engineering

The definition above is for social networking and not social engineering. Social networking sites are responsible for facilitating individuals with common interests and beliefs and operates and functions as an online community of users. Anyone on social media is able to read information posted by others. Thus, social networking carries with it cyber risks like personal data being used maliciously.

Redirecting a user to a fictitious website based on a misspelling of the URL  

g. Typo squatting

Also known as URL hijacking, Typosquatting is a questionable type of cybersquatting that targets internet users who type a web address incorrectly. It is the extreme version and similar to phishing. When users make such errors, they may be lead to another alternative site owned by a hacker.

Phishing attack in which the attacker calls the victim on the telephone

h. Vishing  

Instead of using emails or other forms of communication to contact the potential victim, a simple phone call can be used. Known as voice phishing, an attacker calls an unsuspecting victim and pretends to be someone working with the victim’s bank. The attacker lies to the user that his or her credit card has experienced fraudulent activity, instructs the victim to call a specific number and hangs up. Upon calling back, the victim is instructed by automated instructions telling them to enter credit card numbers and other essential details.

A phishing attack that targets wealthy individuals  

i. Whaling

Whaling is a type of spear phishing where instead of targeting the small fish, it targets the “bigger fish” or the wealthy individuals who have larger sums of money in a bank account. By putting every effort on this group, the attacker can invest more time in the attack and achieve major success.

6 0
3 years ago
Which of the following is not an advantage of a dbms?
vovikov84 [41]
I looked it up and A seems to be it
7 0
3 years ago
Read 2 more answers
In this lab, you complete a Python program that calculates an employee's annual bonus. Input is an employee's first name, last n
HACTEHA [7]

Answer:

The program is as follows (See attachment)

Comments are used to explain some lines

Fname = input("Enter Employee First Name: ")

Lname = input("Enter Employee Last Name: ")

Salary = float(input("Enter Employee Salary: "))

Ratings = int(float(input("Enter Employee Ratings: ")))

#Initialize bonus rate to 0; This will be used if ratings is 4 or 4

bonusRate = 0.0

if Ratings == 1:

       bonusRate =0.25 #If ratings is 1, bonus rate is 0.25

elif Ratings == 2:

       bonusRate = 0.15 #If ratings is 2, bonus rate is 0.15

elif Ratings == 3:

       bonusRate = 0.1 #If ratings is 3, bonus rate is 0.1

bonus = Salary * bonusRate

print(Lname+" "+Fname+"'s employee bonus is "+str(bonus))

#End of Program

Explanation:

The program saves the employee's first name and last name in variables Fname and Lname, respectively

The employee's salary is saved as float datatype in variable Salary

The employee's ratings is saved as int datatype in variable Ratings

For ratings greater than or equal to 4, the bonusRate is set to 0.0; this is done on line 6 of the program

Line 7 to 12 check if employee Ratings is 1, 2 or 3 and the respective bonusRate is used

Line 13 calculates the employee's bonus

Line 14 prints the employee's bonus

The program is ended on line 15

8 0
4 years ago
Q#3. What are the advantages and disadvantages of Analog and Digital computers?​
Pie

Answer:

Advantages of Analog computers:

  • Many data parameters can be obtained concurrently in a simultaneous and real-time procedure.
  • Certain operations can be computed without the need of converters to transform the inputs and outputs to and from digital digital mode.
  • The developer must scale the problem for the computer's dynamic range during configuration. This might provide insight into the issue as well as the consequences of numerous faults.

Disadvantages of Analog computers:

  • Computer systems can handle greater issues for a certain efficiency and power usage.
  • Solution arise in real or delayed time, and recording them for subsequent use or investigation might be problematic.
  • The number of temporal variables that can be used is restricted. It's tough to correctly solve problems with elements that operate on radically various time periods.

Advantages of Digital computers:

  • It is a lot more efficient and more effective, particularly with today's computers, which can analyze information at a billion times the rate of a human.
  • Modern digital computers' incredible speed enables them to recreate objects in real time, resulting in new experiential characteristics of digital computers, such as interactive media.
  • It has the ability to convey information in a very brief manner. This enables data storage and transmission to be more efficient as digital systems are extremely dependable and controllable.

Disadvantages of Digital computers:

  • To complete the same tasks, digital computers need more power than analog computers, resulting in greater heat, which increases the complexity of the computer and necessitates the usage of heating elements.
  • To convey the same amount of data, digital computers require more capacity than analogue computers.
  • The detection of digital computers necessitates synchronization of the computer system, which is not always the scenario with analogue computers

5 0
2 years ago
Other questions:
  • What products use fabric manipulation
    8·1 answer
  • What formula would be used to add two cells together after the equal sign?
    9·2 answers
  • Feature of electric circuit​
    14·2 answers
  • Editing tool for quickly making a repeated change throughout a document
    14·1 answer
  • In C++ :
    6·1 answer
  • When Google created its China-based search engine www..cn, they did not foresee eventually abandoning it because of censorship i
    12·1 answer
  • Social networking allows businesses to _______. a. Connect with hundreds of consumers at once b. Provide personal feedback to co
    12·2 answers
  • The ________ networks operate close to the legitimate free hotspots and typically provide stronger signals
    8·1 answer
  • What are the two broad categories that individual definitional techniques fall under? Check all that apply. Demonstrative defini
    11·1 answer
  • Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!