Answer:
security hacker
Explanation:
security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.
tell me if this is wrong :)
Answer:
the branch of mathematics concerned with the analysis of strategies for dealing with competitive situations where the outcome of a participant's choice of action depends critically on the actions of other participants
Explanation:
In simple terms Game theory is the study of how and why people make decisions.
We still have moderators who watch the site every day they are in the process of acquiring a new one
Answer:
Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the prototype (activity 2), and test the prototype (activity 3). activity 1 is the predecessor for activity 2 and activity 2 is the predecessor for activity 3. if the prototype fails testing, bill must redesign the prototype; therefore, activity 3 is a predecessor for activity 1. this is an example of
b. looping
Explanation:
- The given example is of looping because each activity is leading to another activity on the completion of some conditions.
- The answer a is not valid as it is not just an example of conditional statements rather it is a loop which will keep moving until unless reached a situation to end it.
- The option c, d an e are not right options for the given example.
CLS
INPUT "Enter the first number"; a
INPUT "Enter the second number"; b
m = a
n = b
WHILE a <> 0
r = b MOD a
b = a
a = r
WEND
l = (m * n) / b
PRINT "HCF is "; b
PRINT "LCM is "; l