Answer:
The output is:
R
M
N
Explanation:
The code snippet print the beginning letter of each word in the given name.
In the for loop snippet:
first the program check if startWord is true and it is true, then it print the value of the character at index 0. Then it check if value of character is empty. If it is empty, startWord is initialized to true else it is initialized to false.
The loop only print a character when the value of i are 0, 8 and 11 which are also the beginning character of a word.
Answer:
x=2
x=1
x=2
Explanation:
a)
This if statement if (1+2=3) checks if the addition of two numbers 1 and 2 is true. Here the addition of 1 and 2 is 3 which is true. So the condition becomes true.
Since the condition is true x:=x+1 statement is executed. This statement means that the value of x is incremented by 1.
The value of x was 1 before the if statement is reached. So x:=x+1 statement will add 1 to that value of x.
x:=x+1 means x=x+1 which is x=1+1 So x=2
Hence value of x is 2 (x=2) after the execution of x:=x+1
b)
In statement b the value of x will be 1 because both the mathematical operations in the if statement evaluate to false.
which means in b, x:=x+1 will not be executed and value of x remains unchanged i.e x=1
In (c) the value x will be 2 because the condition in the if statement is true. Both mathematical expressions 2+3=5 and 3+4=7 are true. Therefore x:=x+1 will be executed and value of x will be incremented by 1. Hence x=2
Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.
Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.
Explanation:
Answer:
Decision trees
Explanation:
Decision trees mainly include categorization and estimation. It is often used as a measure of selection. This also encourages the usage and choice of particular data within the overall structure.
In the given situation, we should choose Policy A has cost $150 as it has 100% repayment while on the other hand Policy B has cost $100 and the first $500 of loss would be paid by the owner
So for choosing the policy, we use the decision tree data mining technique as we have to take the decision with respect to minimizing the cost
<u>In network, security plays important roles and implementing is a big task.</u>
1. Gateway committee: It protects the hackers and any malware spyware to attack the network. Once hardware appliance is installed schedule update is happening at regular interval time.
2. Project committee:- it is an implementation plan and with minimum downtime in network and restoring the network and bring back the activities of the network.
3. Security compliance committee: - The network administrator has to select proper hardware appliance and to place in a network with minimum downtime.