Answer:
dominance
Explanation:
i just took it and got it right
Answer:
Following are the program in the Java Programming Language.
//define function
public static boolean checkPalindrome(String str){
//set integer variable to 0
int a = 0;
//set integer variable to store the length of the string
int n = str.length() - 1;
//set the while loop to check the variable a is less than the variable n
while(a<n)
{
//check the string character is not in the variable n
if(str.charAt(a)!= str.charAt(n))
//then, return false
return false;
//the variable a is incremented by 1
a++;
//the variable n is decremented by 1
n--;
}
//and return true
return true;
}
Explanation:
<u>Following are the description of the following function</u>.
- Firstly, we define boolean type public function that is 'checkPalindrome' and pass string data type argument 'str' in its parameter.
- Set two integer data type variables that are 'a' initialize to 0 and 'n' which store the length of the string variable 'str' decremented by 1.
- Set the While loop that checks the variable 'a' is less than the variable 'n', then we set the If conditional statement to check that the string character is not in the variable n then, return false.
- Otherwise, it returns true.
Answer:
The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.
It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.
Explanation:
Solution
One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.
The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.
As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options
<span>External computer parts are those that connect to the case, often to provide ways to input or output data.
Here are a 6 examples of external parts:
</span>Monitor
Keyboard
Mouse
Speakers
Printer
External Hard Drives
I hope this has helped you.