Answer:
The program to this question can be given as follows:
Program:
#include <stdio.h> //include header file for using basic function
int main() //defining main method
{
int strawsOnCamel=0; //defining integer variable and assign value
for(int i=1;i<=5;i++) //loop for increment integer variable value
{
//code
strawsOnCamel++; //increment value by 1
printf("%d\n", strawsOnCamel); //print value
}
return 0;
}
Output:
1
2
3
4
5
Explanation:
In the C language code above the header file is entered, and a whole variable strawsOnCamel is specified within the main method, which gives a value of 0.
- Then a for loop is defined inside a loop an integer variable i declared that starts from 1 and ends with 5.
- Inside a loop, the strawsOnCamel variable is used that increments its value by 1 and prints its value.
Answer:
Big Oh notation is used to asymptotically bound the growth of running time above and below the constant factor.
Big Oh notation is used to describe time complexity, execution time of an algorithm.
Big Oh describes the worst case to describe time complexity.
For the equation; T(N) = 10000*N + 0.00001*N^3.
To calculate first of all discard all th constants.
And therefore; worst case is the O(N^3).
Answer:
1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses. Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.
Explanation:
2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.
Answer and Explanation:
class Dis
{
public static void main(String args[])
{
Scanner sc=new Scanner(System.in);
System.out.println("Enter values for a,b,c");
double a=sc.nextDouble();
double b=sc.nextDouble();
double c=sc.nextDouble();
String s=discriminant(a,b,c);
System.out.println(s);
}
public String discriminant(double a, double b, double c)
{
double result;
result=(
);
if(result<0)
return "no real solutions"";
else return "";
}
}
Note:This program is written in JAVA