Answer:
electronic processing device
Answer:
The program to this question can be given as:
Program:
#include <stdio.h> //include header file.
int main() //defining main method
{
char i,j; //defining variable
for (i='a'; i<='e'; i++) //outer loop for column
{
for (j='a'; j<='e'; j++) //inner loop for row
{
printf("%c%c\n",i,j); //print value
}
}
return 0;
}
Output:
image.
Explanation:
- In the above C language program, firstly a header file is included. Then the main method is defined in this, a method contains a char variable that is "i and j". This variable is used in for loop, that is used to print the pattern.
- To print the following patter two for loop is used the outer loop is used for print columns and the inner loop prints row.
- In C language to print character, we use "%c" inside a loop print function is used, that prints characters.
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.