Answer:
The program to this question can be given as follows:
Program:
#include <stdio.h> //include header file for using basic function
int main() //defining main method
{
int strawsOnCamel=0; //defining integer variable and assign value
for(int i=1;i<=5;i++) //loop for increment integer variable value
{
//code
strawsOnCamel++; //increment value by 1
printf("%d\n", strawsOnCamel); //print value
}
return 0;
}
Output:
1
2
3
4
5
Explanation:
In the C language code above the header file is entered, and a whole variable strawsOnCamel is specified within the main method, which gives a value of 0.
- Then a for loop is defined inside a loop an integer variable i declared that starts from 1 and ends with 5.
- Inside a loop, the strawsOnCamel variable is used that increments its value by 1 and prints its value.
Technological improvements allow me to have greater access to goods around the world. I can buy instantly and communicate instantly with producers. Technology can also help me to monitor economic trends, both in my country and in my own life. In summary, technology helps to give me more freedom to make economic choices.
On e2020
Answer:
Normalization
Explanation:
Converting a poorly-structured table and optimizing its database structure in order to reduce redundancy in relations can be referred to as database normalization. If the data is not redundant means that data inconsistencies and errors like deletion and insertion will get reduced or eliminated significantly.
Answer:
User roles and access authorization
(Explanation of this question is given below in the explanation section.
Explanation:
As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.
The following problem can be with that account
- Unauthorized user access and privileges
The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.
- The firewall may be disabled to detect the malicious script
The firewall should be enabled to detect such types of attack from unauthorized access to the system
May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.
get int input for a
get int input for b
get string input for operator
if a is not int or b is not int throw exception and print error
if operator is not * / // or % throw exception and print error
if operator is * do multiplication of a and b and make answer c
else if operator is / do division of a and b and make answer c
else if operator is // do floor division of a and b and make answer c
else if operator is % do floor modulo of a and b and make answer c
print c