Answer:
The program to this question can be given as:
Program:
#include <iostream> //header file
using namespace std; //using namespace.
void SwapValues(int* userVal1, int* userVal2); //function declaration.
void SwapValues(int* userVal1, int* userVal2) //function definition.
{ //function body.
//perform swapping
int t = *userVal1;
*userVal1 = *userVal2;
*userVal2 = t;
}
int main() //main method
{
int n1, n2; //define variable
cout<<"Enter first number :"; //message
cin>>n1; //input by user.
cout<<"Enter second number :"; //message
cin>>n2; //input by user.
SwapValues(&n1,&n2); //calling function.
cout<<"Swapped values"<<endl;
cout<<"first number is :"<<n1<<endl; //print value
cout<<"second number is:"<<n2<<endl; //print value
return 0;
}
Output:
Enter first number :3
Enter second number :8
Swapped values
first number is :8
second number is :3
Explanation:
The description of the above C++ language program can be given as:
- In the program, firstly we include the header file. Then we declare and define a function that is "SwapValues()" function in the function we pass two integer variable that is "userVal1 and userVal2" inside a function, we define an integer variable that is "t" and perform swapping.
- Then we define the main function in the main function we define two variables that is "n1 and n2" this variable is used to take value-form user. then we pass this value to function and print the function values.
Answer:
An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.
Memory Management.
Processor Management.
Device Management.
File Management.
Security.
Control over system performance.
Job accounting.
Error detecting aid
Explanation:
True. A hacker in proxy manipulation may host a false proxy server or better known as a rogue DHCP and is able to modify the proxy settings on a client to redirect
traffic to another system. The hacker is able to reconfigure a client’s proxy
configuration.