Answer:
Please find the answer in the attached image.
Explanation:
I wrote this program using JavaScript programming language.
// A function to check tickets
function tickets(user_tickets){
var num_tickets;
if (user_tickets < 5) {
num_tickets = 1;
return ('num_tickets: '+ num_tickets);
}
else {
num_tickets = user_tickets;
return('num_tickets: '+ num_tickets);
}
}
// Testing the tickets function
// With user_tickets = 3, 5, 8, and 1
console.log(tickets(3));
console.log(tickets(5));
console.log(tickets(8));
console.log(tickets(1));
Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
Answer:
denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)
Explanation:
Denial-of-service attack -
It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .
The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .
In case of the distributed denial-of-service attack , the flooding is done by many different sources .
Hence , from the given scenario of the question ,
The correct answer is denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .
Reduce the speed of the CPU