Answer:
public class Triangle
{
public static void main( String[] args )
{
show( 5 );
}
public static void show( int n )
{
int i,j,k;
for (i = 0; i < n - 1; i++ )
{
for (j = 0; j < i; j++ )
{
System.out.print( " " );
}
for (k = n - i; k > 0; k-- )
{
System.out.print( "* " );
}
System.out.println();
}
for (i = 0; i < n; i++ )
{
for (j = n - i; j > 1; j-- )
{
System.out.print( " " );
}
for (k = 0; k < i + 1; k++ )
{
System.out.print( "* " );
}
System.out.println();
}
Answer:
The following are code in the Java Programming Language.
//define boolean type function
boolean isReverse(int ar[], int b[])
{
//declare integer type variable
int x;
//set the for loop
for (x=0; x < ar.length && ar[x] == b[ar.length-1-x]; x++);
return x == ar.length;
}
Explanation:
<u>The following are the description of the code</u>.
In the above code that is written in the Java Programming Language, we define the boolean data type function that is 'is Reverse()' and pass two array integer data type arguments that is 'ar', 'b' in the then, declare integer data type variable that is 'x'. Set the for loop that the boolean type value is true or false.
I personally use the Kindle Paperwhite series, but any with an E-ink display will work great, as the display isn't very battery-consuming.
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.