Answer:
A is the input array
B = []
; %B is initially an empty array
for i = 1:length(A)/2 %iterates over A until the midpoint of A
B(i) = A(i) + A(end + 1 - i); %This adds the numbers from the first half and %second half of A, and stores in B
end
disp(B)
Answer:
This question was initially incomplete. Here is the full question:
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
a) The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.
b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.
c) A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.
d) A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.
The correct answer is b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.
Explanation:
For e-commerce sites, shopping cart information are stored as cookies on the visitor's computer such that when the website visitor leaves the website and comes back a few days later, their shopping preferences are remembered.
If the website visitor uses an anonymous window, the cookies created during the browsing session will be deleted when the anonymous website is exited and so, items placed in the shopping cart for future purchase will not be saved.
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules.
Keywords are the reserved words of a language.Identifiers are the user defined names of variable, function and labels. Hope that this helped