Answer:
Explanation:
//C++ program to calculate the number of chocolate bars to consume in order to maintain one's weight.
#include <iostream>
#include <math.h>
using namespace std;
int main() {
float weight,height;
int age,choice;
char gender;
float bmr;
// inputs
cout<<"\n Enter weight(in pounds) : ";
cin>>weight;
cout<<"\n Enter height(in inches) : ";
cin>>height;
cout<<"\n Enter age(in years) : ";
cin>>age;
cout<<"\n Enter gender(M for male , F for female) : ";
cin>>gender;
cout<<"\n Are you :\n 1. Sedentary \n 2. Somewhat active(exercise occasionally)\n 3. Active(exercise 3-4 days per week)\n 4. Highly active(exercise everyday)? ";
cout<<"\n Choice(1-4) ";
cin>>choice;
//calculate bmr based on the gender
if(gender == 'm' || gender == 'M')
{
bmr = 66+(6.3*weight)+(12.9*height)-(6.8*age);
}else if(gender == 'f' || gender == 'F')
{
bmr = 655+(4.3*weight)+(4.7*height)-(4.7*age);
}
// update bmr based on how active the user is
if(choice ==1)
bmr = bmr + (20*bmr)/100;
else if(choice == 2)
bmr = bmr + (30*bmr)/100;
else if(choice ==3)
bmr = bmr + (40*bmr)/100;
else if(choice ==4)
bmr = bmr + (50*bmr)/100;
// output
cout<<"\n The number of chocolate bar that should be consumed = "<<ceil(bmr/230);
return 0;
}
//end of program
It is a (software) program that is installed on a computer without the user's knowledge for the purpose of making harmful changes. A computer virus attaches itself to another program (the execution of the host program triggers the action of the virus). And most of them perform actions that are malicious in nature, such as destroying data. A computer virus operates in two ways: As soon as it lands on a new computer, begins to replicate or it plays dead until the trigger kick starts the malicious code. The term 'computer virus' was formally defined by Fred Cohen in 1983.
Answer:
A computer virus is a virus attached onto your computer, and it gives you bugs and can often delete your important files.
Answer:
An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as
TCP Session Hijacking.
Explanation:
TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network. The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server. To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.
report which device drivers a computer uses
B.
determine which ports are open on a computer
C.
report the status of individual computer users
D.
determine which operating system is running on a computer
Answer: C)report the status of individual computer users
Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.
Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)
Answer and Explanation:
This type of attack is caused by Trojan Horse.
Most of the times, Trojan is veiled as genuine programming which for this situation is an internet banking framework and can empower the spying by the cyber criminals, theft and gain to remote access to your framework and data. These activities can include:
Among other hurtful activities none of which look good with the beneficiary PC.
Answer:
(1) Carry flag (2) Overflow flag (3) Sign or negative Flag
Explanation:
Solution
(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit
(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations
(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations generated a value to know if the most significant bit was set.
Answer:
Trojan horse
Explanation:
A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.