Phishing is a serious cyber threat that can result in identity theft, financial loss, and other harmful consequences.
Phishing is a fraudulent activity where an attacker, posing as a trustworthy entity, attempts to obtain sensitive information such as login credentials, credit card details, and other personal information from unsuspecting individuals. Phishing attacks are usually carried out through email, social media, and instant messaging.
There are three main types of phishing attacks that were discussed in the activity. The first type is called spear phishing, which targets a specific individual or organization. The second type is called whaling, that targets high-profile individuals such as executives and government officials. The third type is called pharming, which is a more sophisticated form of phishing that involves redirecting users to a fake website without their knowledge.
To know more about Phishing visit:
https://brainly.com/question/24156548
#SPJ11
Select all statements from the given choices that are the negation of the statement:
Michael's PC runs Linux.
Select one or more:
a. It is not true that Michael's PC runs Linux.
b. It is not the case that Michael's PC runs Linux.
c. None of these
d. Michael's PC runs Mac OS software.
e. Michael's PC runs Mac OS software and windows.
f. It is false that Michael's PC runs Linux.
g. Michael's PC doesn't run Linux.
h. Michael's PC runs Mac OS software or windows.
i. Michael's PC runs Windows
The statements that are the negation of "Michael's PC runs Linux" are: a. It is not true that Michael's PC runs Linux. b. It is not the case that Michael's PC runs Linux. d. Michael's PC runs Mac OS software. e. Michael's PC runs Mac OS software and windows. f. It is false that Michael's PC runs Linux. g. Michael's PC doesn't run Linux. h. Michael's PC runs Mac OS software or windows. i. Michael's PC runs Windows.
The negation of a statement is the opposite or contradictory statement. In this case, the statement "Michael's PC runs Linux" can be negated in multiple ways.
Options a, b, f, and g all express the negation by denying the truth of the original statement. Option d states that Michael's PC runs Mac OS software, which contradicts the statement that it runs Linux. Option e extends the negation by adding the condition that Michael's PC runs both Mac OS software and Windows, further diverging from the original statement. Option h also offers a contradictory statement by stating that Michael's PC runs either Mac OS software or Windows, but not Linux. Finally, option i simply states that Michael's PC runs Windows, which excludes Linux.
In summary, options a, b, d, e, f, g, h, and i all provide statements that negate the original claim that Michael's PC runs Linux.
Learn more about software.
brainly.com/question/32393976
#SPJ11
Computer integrated manufacturing includes all of the following technologies except a. robotics b. materials requirements planning c. automated storage and retrieval systems d. computer aided design
Computer-integrated manufacturing (CIM) is a process of using computer technology to automate and integrate different manufacturing processes. It is an approach that enables manufacturers to improve their production efficiency, reduce costs, and increase productivity. The goal of CIM is to connect different manufacturing processes into one automated system
CIM includes several technologies that work together to automate different manufacturing processes. Some of the technologies that are included in CIM are robotics, materials requirements planning, automated storage and retrieval systems, and computer-aided design. Each of these technologies has its unique role to play in the CIM process.
Robotics, for example, involves the use of robots to perform manufacturing tasks that are repetitive or dangerous for humans. Materials requirements planning, on the other hand, is a system for managing the materials needed for production, including raw materials, finished goods, and work in progress. Automated storage and retrieval systems are used to automate the storage and retrieval of materials, tools, and products, while computer-aided design is used to create digital models of products and simulate manufacturing processes.
However, among these four technologies, computer-aided design is the only one that is not included in CIM. Computer-aided design is a technology that is used to create digital models of products, and it is often used in the product design phase before the manufacturing process begins. While it is an essential part of the manufacturing process, it is not a part of CIM, which focuses on the automation and integration of manufacturing processes.
Learn more about digital models here:
https://brainly.com/question/18711192
#SPJ11
what is computer development mean
Answer:
Computer development refers to the ongoing process of advancements and improvements in the field of computers and their associated technologies. It involves the evolution of hardware, software, and systems that make up modern computing devices. Computer development encompasses a wide range of areas, including computer architecture, programming languages, operating systems, networking, artificial intelligence, and more.
Computer development can be understood from two perspectives:
Hardware Development: This aspect focuses on the design, manufacturing, and enhancement of computer components and devices. It involves innovations in areas such as processors, memory, storage devices, input/output devices, graphics cards, and other hardware components. Hardware development aims to improve the speed, efficiency, reliability, and capabilities of computers.
Software Development: This aspect involves creating, modifying, and optimizing software programs and systems that run on computers. It encompasses the development of operating systems, application software, programming languages, algorithms, and frameworks. Software development aims to provide new functionalities, enhance user experiences, and improve the efficiency and security of computing systems.
Both hardware and software development are interconnected and influence each other. Advancements in hardware often drive the need for software innovations to leverage the capabilities of new hardware, and vice versa. The continuous development of computers has led to significant improvements in processing power, storage capacity, connectivity, and the overall capabilities of computing devices. These advancements have transformed various aspects of our lives, including communication, entertainment, healthcare, education, business, and scientific research.
Explanation:
Explanation:
computer development means the act of computer to develop effectively
an application receiving data on a stream socket must call recv() repeatedly to assure that all transmitted data has been received. an application receiving data on a datagram socket needs to call recvfrom() only once to receive the entire message. why?
An application receiving data on a stream socket must call recv() repeatedly to assure that all transmitted data has been received. An application receiving data on a datagram socket needs to call recvfrom() only once to receive the entire message because datagram sockets deliver messages as a complete unit, whereas stream sockets deliver data in a continuous stream.
Stream sockets, also known as connection-oriented sockets, provide a reliable, ordered, and error-checked data transmission mechanism. The data transmitted over a stream socket is treated as a continuous stream of bytes, and the receiver must call the recv() function repeatedly until all the data has been received. On the other hand, datagram sockets, also known as connectionless sockets, provide an unreliable, unordered, and un-checked data transmission mechanism.
The data transmitted over a datagram socket is delivered as a complete message, and the receiver can retrieve the entire message by calling the recvfrom() function only once. However, because datagram sockets are unreliable, it is up to the application to ensure that the entire message has been received correctly.
You can learn more about socket at
https://brainly.com/question/29405031
#SPJ11
what are the methods used in research methodology?
write an abstract about data encryption standard
Answer:
The Data Encryption standard is used to protect electronic data. DES algorithm uses symmetric block cipher for encrypting and decrypting data. Encryption converts data into gibberish language called cipher text. Decrypting the cipher text gives us back the original data that is plaintext. is also a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). 6.1.1 History In 1973, NIST published a request for proposals for a national symmetric-key cryptosystem. A proposal from IBM, a modifi cation of a project called Lucifer, was accepted as DES.
Explanation:
if this works can i have brainliest
In the list [0, 13, 5.4, "integer"], which element is at index 2?
A.0
B.13
C.5.4
D.“integer”
Answer: C) 5.4
The index starts at 0
index 0 = 0index 1 = 13index 2 = 5.4index 3 = "integer"If there are n elements in a list, then the index ranges from 0 to n-1.
Create a C++ program to compute the average of three tests or quizzes and display the score and average on distinct lines, and do it using arithmetic operators.
#include <iostream>
#include <vector>
#include <numeric>
int main() {
std::vector<int> store(3);
for(int i=0;i<3;i++){
std::cout << i+1 << ". test result: ";
std::cin>>store[i];
}
for(int i=0;i<3;i++) {
std::cout << i+1 << ". test score: " << store[i] << std::endl;
}
std::cout << "Average: " << double(std::accumulate(store.begin(),store.end(),0.0)/store.size()) << std::endl;
return 0;
}
I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.
The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.
Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.
To wrap text in Excel, follow these simple steps:
Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.
To wrap text in Microsoft Word, follow these simple steps:
Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.
To learn more about wrap text, visit:
https://brainly.com/question/27962229
#SPJ11
If the range_lookup argument to the VLOOKUP function is set to TRUE, then the leftmost column of the table_array argument must be in ascending order.Group of answer choicesTrueFalse
In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.
What is VLOOKUP function?A VLOOKUP function can be defined as a type of function that is typically used to look up a value in a specific column in Microsoft Excel.
In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.
This ultimately implies that, you have to sort the leftmost column of the table_array argument in an ascending order (a through z), in order to get the right results when the range_lookup argument to the VLOOKUP function is set to TRUE.
Read more on VLOOKUP here: https://brainly.com/question/16986179
Create an ERD for a database that describes a criminal enterprise for which you are the kingpin. This could be for arms smuggling, bookmaking, textbook publishing, starting a social media company and stealing everyone's data... whatever you like. The important elements are the entities and the cardinality of the relationships between them. Include enough detail to explore the capabilities of the tool and to demonstrate that you learned something.
The ERD for the criminal enterprise's database is an important tool for identifying, capturing, and interpreting information related to the enterprise's entities and their relationships.
An entity-relationship diagram (ERD) is a model that depicts the relationships between entities in a database. In this scenario, we'll be developing an ERD for a criminal enterprise, with the kingpin as the central figure. The ERD will illustrate the entities involved in the enterprise as well as their relationships. We will begin by identifying the entities and then describing their relationships in terms of cardinality. We'll also keep track of any additional information that may be useful in building the enterprise's database.
In conclusion, the ERD for the criminal enterprise's database is an important tool for identifying, capturing, and interpreting information related to the enterprise's entities and their relationships.
To know more about entity-relationship diagram visit:
brainly.com/question/33440190
#SPJ11
In a circular array-based implementation of a queue, what is the performance of the enqueue operation if you amortize the cost of resizing the array over all additions to the queue? a) O(1). b) O(n). c) O(log n). d) O(n2).
In a circular array-based implementation of a queue, the performance of the enqueue operation, when amortizing the cost of resizing the array over all additions to the queue, is O(1).
So, the correct answer is A.
This means that the average time complexity of enqueue remains constant, regardless of the number of elements in the queue.
The array is resized occasionally, but since the cost of resizing is distributed over several enqueue operations, the overall average performance remains constant.
Therefore, the correct answer is A) O(1).
Learn more about array at https://brainly.com/question/30891643
#SPJ11
Match the items (Companies) in the left-hand column, to the most appropriate item in the right-hand column. Motorola [Choose ] [Choose ] Just-in-Time Six Sigma ERP TORC Driverless Vehicles Toyota [Choose ] SAP [Choose ]
The defect levels reported by Motorola in their Six Sigma program were higher than expected because of the nature of their processes following an exponential distribution.
This means that Motorola only allowed for failure in one tail of the distribution, which increases the likelihood of failure and causes the defect levels to be higher than the standard normal table's capability calculations.
Additionally, Motorola had not accounted for a 1.5 sigma shift in the mean, which also contributed to the higher defect levels. Through their Six Sigma efforts, Motorola found that their process variation had increased, which explains why their defect levels were higher than expected.
To learn more about six sigma program refer :
brainly.com/question/30269340
#SPJ4
Look at the options below. Which one is a simulation?
Im going to guess the 2nd one.
The 1st one just shows how trees can make ____ and then goes to water, the sun, then the rain but it CAN be used as one.
The 2nd one seems to explain the best it can show about weather, water, landforms, the sun, and seems like a better one to choose.
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.
Answer:
Your answer is...
Visual.With visual voicemail, users can view message details, and in some cases read message contents without listening to them.
I hope this helped at all.
40) The Museum of Natural History in Aarhus, Denmark uses ________ to collect detailed information about visitors' use of the exhibits to help determine visitors' behavior to identify high-demand exhibits.
A) group decision systems
B) algorithms
C) RFID
D) expert systems
C) RFID. The Museum of Natural History in Aarhus, Denmark uses RFID technology to collect detailed information about visitors' use of the exhibits to help determine visitors' behavior and identify high-demand exhibits.
Tags and readers are the two halves of the wireless system known as Radio Frequency Identification (RFID). The reader is an electronic gadget with one or more antennas that transmit radio waves and take in signals from RFID tags. Tags can be passive or active, using radio waves to transmit their identity and other information to adjacent readers. Without a battery, passive RFID tags are powered by the reader. Batteries are used to power active RFID tags. RFID tags can contain a variety of data, ranging from a single serial number to many pages of information. Readers can be fixed on a post or suspended from the ceiling, or they can be portable so they can be carried by hand.
Learn more about museum here-
https://brainly.com/question/28053036
#SPJ11
HURRY GIVING BRAINLIEST AND ALL MY POINTS and I only have 40
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
4. Use two variables to store your message.
Answer:
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
4. Use two variables to store your message
Explanation:
Answer:
A few sentences about you .
Explanation:
describe the difference between explicit typed variables and implicit typed variables using examples. in large scale applications, explain whether or not explicit declaration has a better impact over implicit declaration.
Although implicit typing can make the code shorter and more concise, the advantages of explicit typing in terms of readability, maintenance, and error prevention usually outweigh its benefits in large-scale applications.
Describe the difference between explicit typed variables and implicit typed variables?The difference between explicit typed variables and implicit typed variables involves how the data type is specified during variable declaration.
In explicit typing, you explicitly declare the data type of a variable when it's defined. For example:
```csharp
int num = 42;
string text = "Hello, world!";
```
Here, the data types 'int' and 'string' are explicitly stated before the variable names 'num' and 'text', respectively.
In implicit typing, you use the 'var' keyword and let the compiler determine the data type based on the assigned value. For example:
```csharp
var num = 42;
var text = "Hello, world!";
```
The compiler infers the data types 'int' and 'string' for 'num' and 'text', respectively, based on the values assigned.
In large-scale applications, explicit declaration tends to have a better impact over implicit declaration. This is because explicit typing:
Improves code readability: Knowing the data type of a variable immediately helps understand its purpose and usage within the code.
Avoids unintended type inference: Using 'var' might lead to the compiler inferring a data type that is not what you intended, which could cause bugs or performance issues.
Eases code maintenance: Explicitly declaring data types makes it easier to identify errors and maintain the codebase.
Although implicit typing can make the code shorter and more concise, the advantages of explicit typing in terms of readability, maintenance, and error prevention usually outweigh its benefits in large-scale applications.
Learn more about explicit and implicit typed variables
brainly.com/question/12996861
#SPJ11
access to opportunities at cloud kicks should be restricted. sales users should only have access to two categories of opportunities: opportunities they own, and opportunities that are tied to accounts they own. what are two actions a consultant can take to meet the requirement? choose 2 answers
The correct option are-
B. Set opportunity access on the role to view all opportunities associated with their accounts.C. Set organization-wide defaults for opportunities to Private.Explain the term cloud kicks?Using Data Loader, Cloud Kicks (CK) is transferring Account and Contact data from just a vintage CRM system into Salesforce.
Any hosted service that is offered online is referred to as cloud computing. These services frequently consist of servers, database, software, networks, analytics, and other cloud-operated computer tools.Users of the service can access files and applications stored on the cloud from any location, doing away with the need to constantly be close to actual hardware. For instance, user-created spreadsheets and documents used to need to be saved to just a physical hard disk drive, USB device, or disc.For the stated question-
Opportunities from cloud kicks should only be accessible to certain people. Only the opportunities they possess and the opportunities connected to the accounts they own should be available to sales users.
There are two ways a consultant can fulfil the requirement:
To examine all opportunities connected to their accounts, the role must have opportunity access set.Set Opportunities' organization-wide defaults to Private.To know more about the cloud kicks, here
https://brainly.com/question/30087928
#SPJ4
The complete question is-
Access to opportunities at cloud kicks should be restricted. sales users should only have access to two categories of opportunities: opportunities they own, and opportunities that are tied to accounts they own.
what are two actions a consultant can take to meet the requirement? choose 2 answers.
A. Set Territory Management to grant Read access to opportunities owned by others.
B. Set opportunity access on the role to view all opportunities associated with their accounts.
C. Set organization-wide defaults for opportunities to Private.
D. Set organization-wide defaults for opportunities to Public Read-Only
Each box on a spreadsheet is called a?
row
column
cell
box
if a host uses the transport control protocol (tcp) to send data using the router in part b), what is the efficiency for the standard tcp packet header size? what is the average tcp throughput?
If a host is using the transport control protocol (TCP) to send data through the router mentioned in part b), the efficiency for the standard TCP packet header size would depend on the size of the packet being sent. The standard TCP packet header size is 20 bytes, which means that if the packet being sent is smaller than 20 bytes, the efficiency would be lower as more data would be taken up by the header.
In terms of the average TCP throughput, this would depend on various factors such as the bandwidth of the network, the latency, and the congestion control algorithms being used. TCP is designed to adapt to changing network conditions and optimize throughput accordingly. Therefore, it is difficult to give a specific average TCP throughput without more information about the network and the data being sent.
To know more about TCP packet visit:
brainly.com/question/29562357
#SPJ11
In addition to file sharing and print sharing, a home server PC's basic roles include _______________.A.media streamingB.virtualizationC.video editingD.audio editing
The fundamental functions of a home server PC include file and print sharing, media streaming, virtualization, video editing, and audio editing.
A home server PC is a versatile tool that can fulfill a variety of roles beyond just file and print sharing. Some of the basic roles include media streaming, which allows you to stream music, videos, and other media files to other devices in the home network. Virtualization enables you to create and manage virtual machines on a single physical server, while video editing requires a more powerful system with specialized software. Similarly, audio editing requires specialized software and hardware. Overall, a home server PC can be a powerful tool for a variety of tasks beyond basic file and print sharing.
Learn more about Home server PC roles here.
https://brainly.com/question/13262932
#SPJ11
list three advantages of using computers for weather forecasting instead manual system
Answer:
1.enhace the speed and accuracy of work
2.Large historical data can be stored easily for future use.
3.Quick calculation and display of graphical and mathematical data.
Advantages:
The ability to retain or retrieve enormous amounts of past data.The ability to quickly combine data from numerous sites to monitor changes.Ability to swiftly create data visualization to make information accessible.Learn more:
weather forecasting: brainly.com/question/12516408
1. How many lines would be required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm? What would the actual display tolerance be for this number of lines?
The number of lines required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm, we can calculate the circumference of the circle and divide it by the desired display tolerance.
Circumference of the circle = π * diameter
= π * 200 mm
Number of lines required = Circumference of the circle / Display tolerance
= (π * 200 mm) / 0.1 mm
To find the actual display tolerance for this number of lines, we divide the circumference of the circle by the number of lines:
Actual display tolerance = Circumference of the circle / Number of lines
= (π * 200 mm) / (Circumference of the circle / Display tolerance)
= Display tolerance
Therefore, the actual display tolerance for the calculated number of lines will be equal to the desired display tolerance of 0.1 mm. In summary, the number of lines required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm is determined by dividing the circumference of the circle by the display tolerance. The actual display tolerance for this number of lines remains at 0.1 mm.
Learn more about tolerance calculations here:
https://brainly.com/question/30363662
#SPJ11
You create a new microflow from within the properties window of a button. your new microflow has a parameter with an object. what does this mean?
A parameter is a certain kind of variable that is utilized as an intake for the microflow.
What is microflow?Fluid passing through a microscale device is referred to as a microflow (plural: microflows). Nanoflows are another Mendix concept used for offline apps that run in the Mendix client. Microflows give us the ability to communicate the application's logic. A microflow can show pages, make decisions, and conduct actions such as creating, updating and removing items. The microflow actions are recorded using microflow expressions. Microflow expressions are used to specify a database query. Microflow expressions are used to modify, verify, and extract information from the values that are already there. Microflow consists of three parts: Activity, Exclusive split, and Parameter.To learn more about parameter, refer to:
https://brainly.com/question/13794992
#SPJ4
Prezi is a web based presentation software that contains animations.
True
False
Answer:
True
Explanation:
Because Prezi is used for presentations and also contains animations.
How does a packet get delivered in a network?
When data is sent over a network, it is broken down into smaller pieces called packets. These packets contain the data being sent along with information about its destination, such as the IP address of the device it is intended for.
A packet gets delivered in a network through a process called routing. A router is a networking device that is responsible for directing packets from one network to another. When a packet is sent from one device to another, it first goes to the default gateway of the sending device.
The default gateway is the router that the device is connected to. The router then checks the packet's destination IP address to determine the next hop on the path to the destination device. This process is repeated at each router along the way until the packet reaches its destination.Once the packet has reached its destination, it is reassembled into the original data.
Overall, the delivery of a packet in a network involves multiple routers working together to direct the packet to its destination. The process of routing is essential for ensuring that data is sent quickly and reliably over a network.
Know more about the routing
https://brainly.com/question/27960570
#SPJ11
Which Access 2016 view shows the contents of a table as a datasheet? a. Design view b. Datasheet view c. Form view d. Table view.
The Access 2016 view that shows the contents of a table as a datasheet is the Datasheet view. The correct answer is option b.
Access 2016 is a relational database management system that allows users to store and manipulate large amounts of data. When working with tables in Access 2016, there are different views available to help users manage the data.
The Design view is used to create and modify the structure of a table, including its fields, data types, and relationships with other tables. This view is not used to view the contents of a table.
The Table view displays the contents of a table in a grid format, with each row representing a record and each column representing a field. However, this view does not provide the same level of functionality as the Datasheet view.
The Form view allows users to enter and edit data in a more user-friendly format. Forms can be customized to display specific fields and can include additional features such as drop-down menus and validation rules.
The Datasheet view is the view that shows the contents of a table as a datasheet, which is a grid format similar to the Table view. However, the Datasheet view provides additional functionality, such as sorting, filtering, and searching for specific data within the table. This view is commonly used for data entry and manipulation in Access 2016.
To learn more about database management system: https://brainly.com/question/24027204
#SPJ11
assslainsdffddsvvdesdssbhasasco5m
Write a program that gets a list of integers from input, and outputs non-negative integers in ascending order (lowest to highest). Ex: If the input is: 10 -7 4 39 -6 12 2 the output is: 2 4 10 12 39
Answer:
Following are the code to this question:
#include <iostream>//defining header file
using namespace std;
int main()//defining main method
{
int a[]={10,-7,4,39,-6,12,2};//defining single deminition array and assign value
int i,x,j,t; //defining integer variable
cout<<"Before sorting value: ";
for(i=0;i<7;i++) //using loop to print value
{
cout<<a[i]<<" ";//print value
}
cout<<endl <<"After sorting value: ";
for(i=0;i<7;i++)//defining loop to sort value
{
for(j=i+1;j<7;j++)//count array value
{
if(a[i]>a[j]) //defining condition to inter change value
{
//performing swapping
t=a[i]; //integer variable t assign array value
a[i]=a[j];//swapp value
a[j]=t;//assign value in array
}
}
}
for(i=0;i<7;i++) //defining loop to print value
{
if(a[i]>=0) //defining condition to check positive value
{
cout<<a[i]<<" ";//print value
}
}
return 0;
}
Output:
Before sorting value: 10 -7 4 39 -6 12 2
After sorting value: 2 4 10 12 39
Explanation:
Following are the description to the above code:
In the above program code, Inside the main method, an array a[] is declared that assign some value, and another integer variable "i, j, x, and t" is declared, in which variable "i and j" are used in the loop, and "x, t" is used to sort value.In the next step, three main for loop is declared, in which the first loop is used to print array value.In the second loop, inside another loop is used that sorts array values.In the last loop, a condition is defined, that check the positive value in the array and print its values.Answer:
integers=[]
while True:
number=int(input())
if number<0:
break
integers.append(number)
print("",min(integers))
print("",max(integers))
Explanation: