Answer:
Always encrypt data never store anything in plain text someone could use wireshark to pull out a data packet and if the data is not encrypted, expect things to happen.
// Variable to keep track of array size
int length = 0;
// Array itself
int array[] = {};
// while loop will take input in the array until a negative number is entered
while(input>=0){
stdin = new Scanner(System.in);
array[length] = stdin;
length +=1;
}
// int variable to terminate while loop
int i =0;
// keep track of index of output array
int y =0;
while(arr[i] != length){
// making output array
int output[]={}; bool flag;
// put the element in out put array considering if it the desired one
output[y] = array [i];
// Now check if it was the desired?
for(int z=1;z<=length;z++){
if(array[i+z]!=output[y]){
flag = true;
}
else
{
output[y]=0;
y+=1;
}
if(array[i+z+1]=output[y] && flag == true){
output[y] = array[i];
y+=1;
}
}
//output the array
for(int o=0;o<y;o++)
System.out.println(output[o];
Answer:
int[ ][ ] X = new int[5][5];
It can also be declared and initialized this way:
int[][] X = {
{1,2,3,6,8},
{4, 5, 6, 9},
{7,5,6,8,9},
{8,5,8,8,9},
{10,2,6,8,11},
};
Explanation:
Above is a declaration of a two-dimensional array that can hold 5*5=25 int values. A java program is given below:
public class JavaTwoD{
public static void main(String args[ ]) {
// creating the 5X5 array
int[ ][ ] X = new int[5][5];
// looping through the array to add elements
for (int i = 0; i < X.length; i++) {
for (int j = 0; j < X[i].length; j++) {
X[i][j] = i * j;
}
}
Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.
Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.
Learn more about information here-
brainly.com/question/15709585
#SPJ4