Suppose we have an array A with n elements. There are n planes on Earth and they are numbered from 1 to n. The plane with number i likes plane A[i]. A[i] != i. We have to check whether there are three planes p, q, and r where p likes q, q likes r and r likes p.So, if the input is like A = [2, 4, 5, 1, 3], then the output will be True, because the triplet is [2, 4, 1].StepsTo solve this, we will follow these steps −n := size of A for initialize i := 0, ... Read More
Suppose we have a number n. An array B is good if the sum of its elements is divisible by the length of this array. We can say an array A with n elements is perfect, if non-empty subarray of this array A is good and elements in A is in range 1 to 100. From the number n, we have to find an array A which is perfect.So, if the input is like n = 4, then the output will be [7, 37, 79, 49], other answers are also possible.StepsTo solve this, we will follow these steps −for initialize ... Read More
An intrusion detection system (IDS) is an app or device that monitors inbound and outbound network traffic, continuously analyzing events for changes in patterns, and alerts an administrator when it identify unusual behavior. An administrator can reviews alarms and takes actions to delete the threat.For example, an IDS can inspect the data carried by network traffic to look if it includes known malware or other malicious content. If it can identify this type of threat, it sends an alert to the security team so they can investigate and remediate it. Because your team receives the alert, they should act rapidly ... Read More
Suppose we have an array A with n elements and another number k is there. Consider there are n problems on a contest. Amal's problem solving skill is k. Amal always solves problem from any of the ends of a list. And He cannot solve problem whose difficulty is greater than k. He stops when the left and right problems' difficulty is greater than k. We have to count how many problems he can solve. A[i] represents the difficulty of ith problem.So, if the input is like A = [4, 2, 3, 1, 5, 1, 6, 4]; k = 4, ... Read More
An intrusion detection system (IDS) is software specifically develop to monitor network traffic and find irregularities. An IDS is designed to detect network traffic and match traffic designs to known attacks. Through this method, sometimes known as pattern correlation, an intrusion prevention system can determine if unusual event is a cyberattack.Because suspicious or malicious activity is found, an intrusion detection system will send an alarm to specified technicians or IT administrators. IDS alarms allows us to rapidly start troubleshooting and identify root sources of problems, or discover and stop harmful agents in their tracks.Intrusion Detection System (IDS) technology is an ... Read More
Physical access control systems are a type of physical security intended to restrict or enable access to a specific area or building. Often, PACS are installed to secure businesses and property from vandalism, theft, and trespassing, and are particularly useful in facilities that needed larger levels of security and protection.Access controls protect against imprudent access of equipment, data documents, and software. It can restrict physical access, a security system should be able to differentiate between authorized and unauthorized individuals. Physical access can be restricted using three general techniques.Identification − Identification based on comparing the physical traits of the individual with ... Read More
Suppose we have three numbers c0, c1 and h, and a binary string S. We can flip any bit in S. We should pay h coins for each change. After some changes (possibly zero) we want to buy the string. To buy the string we should buy all its characters. To buy the bit 0 we should pay c0 coins, to buy the bit 1 you should pay c1 coins. We have to find the minimum number of coins needed to buy the string.So, if the input is like c0 = 10; c1 = 100; h = 1; S = ... Read More
A disaster is described as a sudden misfortune that is disastrous to an undertaking. Natural disasters contains all types of severe weather, which have the potential to pose an essential threat to human health and safety, property, demanding infrastructure, and homeland security.Natural disasters appears both seasonally and without warning, subjecting the nation to frequent time of insecurity, disruption, and monetary loss. These resources serve to prepare IHEs for several natural disasters, such as winter storms, floods, tornados, hurricanes, wildfires, earthquakes, or any combination thereof.There are specific natural disasters can severely damage the computer system directly, or avoid its operations. These ... Read More
A physical threat is a potential cause of an incident that can result in loss or physical harm to the computer systems. Physical security is represented as the security of personnel, hardware, programs, networks, and data from physical situations and events that can support severe losses or harm to an enterprise, departments, or organization. This contains security from fire, natural disasters, robbery, theft, elimination, and terrorism.Physical threat to a computer system can be as an outcome of loss of the entire computer system, damage of hardware, damage to the computer software, theft of the computer system, vandalism, natural disaster including ... Read More
Physical security is an important part of a security plan. It forms the basis for several security efforts, such as data security. Physical security defines the protection of constructing sites and equipment (and all other data and software contained therein) from theft, vandalism, natural disaster, man-made catastrophes, and accidental damage (e.g., from automatic surges, extreme temperatures, and spilled coffee).It needed solid building construction, appropriate emergency preparedness, reliable power supplies, adequate climate control, and appropriate protection from intruders. Risk assessment process recognizes the organization’s vulnerabilities. It can need the vulnerabilities list to set priorities on resources required.Every improvement of an identified ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP