Answer:
See explaination
Explanation:
#include<iostream>
#include<stack>
#include <algorithm> // std::make_heap, std::pop_heap, std::push_heap, std::sort_heap
#include <vector> // std::vector
using namespace std;
void StaticArray()
{
unsigned int array[64536];
for(unsigned int i=0;i<64536;i++)
array[i]=i;
}
void Stack()
{
stack<unsigned int> mystack;
for(unsigned int i=0;i<64536;i++)
mystack.push(i);
}
void Heap()
{
unsigned int myints[64536];
for(unsigned int i=0;i<64536;i++)
myints[i]=i;
vector<unsigned int> v(myints,myints+64535);
make_heap (v.begin(),v.end());
push_heap (v.begin(),v.end());
}
int main()
{
StaticArray();
Stack();
Heap();
return 0;
}
Answer:PART A
(1) Virus attack
(2) Fraud achieved by manipulating records by hackers
(3) Intellectual property theft.
PART B
COMPUTER SYSTEM
PART C
It will hurt the company in the following ways
(1) Loss business opportunities
(2) Increase in cost of operation as it will result in making certain expenses for it to be restored
(3) Loss of work time.
Explanation: Harm is any unanticipated eventualities that are capable of adversely affecting a person or an organisation. Harm can be as a result of theft or loss of certain resources which includes the COMPUTER SYSTEM.
When this loss takes place it can lead to Virus attack,fraud can be achieved by harkers through the manipulation of records, intellectual property theft.
THROUGH THIS HARM THE COMPANY WILL LOSS WORK TIME, LOSS SOME AMOUNT OF MONEY AND SOME BUSINESS OPPORTUNITIES.
<span>Which option will you use to expose your presentation to the audience?
</span><span>B)Slide Show</span>
The separate identity allows the database definition to be changed without affecting related applications is known as <u>DATA.</u>
<u>Explanation:</u>
Normally nowadays program and database are keeping separately. MySQL server, mongo dB, oracle, sql server extra installed separate followed folder or separate drive in operating system.
So software program just use connectivity technology to add or update or delete information from in the database. Form or report just access the data from database and produce required output.
Normal SQL database will stored as records as rows in tables. Normally database can been access through database application directly to update records such as SQL PLUS, MYSQL workbench etc.
Answer:
D
Explanation:
In the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark had determined that the type of traffic carried in the next layer was Internet Protocol (IP).