Articles on Trending Technologies

Technical articles with clear explanations and examples

C++ program to find permutation with n peaks

Arnab Chakraborty
Arnab Chakraborty
Updated on 03-Mar-2022 334 Views

Suppose we have two numbers n and k. We have to construct a permutation A using the numbers from 1 to n which has exactly k peaks. An index i is said to be peak of an array A, if A[i] > A[i-1] and A[i] > A[i+1]. If this is not possible, return -1.So, if the input is like n = 5; k = 2, then the output will be [2, 4, 1, 5, 3], other answers are also possible.StepsTo solve this, we will follow these steps −if k > (n - 1) / 2, then:    return -1 Define an array a of size: 101. for initialize i := 1, when i

Read More

C++ program to check three items circularly likes next item or not

Arnab Chakraborty
Arnab Chakraborty
Updated on 03-Mar-2022 167 Views

Suppose we have an array A with n elements. There are n planes on Earth and they are numbered from 1 to n. The plane with number i likes plane A[i]. A[i] != i. We have to check whether there are three planes p, q, and r where p likes q, q likes r and r likes p.So, if the input is like A = [2, 4, 5, 1, 3], then the output will be True, because the triplet is [2, 4, 1].StepsTo solve this, we will follow these steps −n := size of A for initialize i := 0, ...

Read More

C++ program to find perfect array of size n whose subarray is a good array

Arnab Chakraborty
Arnab Chakraborty
Updated on 03-Mar-2022 261 Views

Suppose we have a number n. An array B is good if the sum of its elements is divisible by the length of this array. We can say an array A with n elements is perfect, if non-empty subarray of this array A is good and elements in A is in range 1 to 100. From the number n, we have to find an array A which is perfect.So, if the input is like n = 4, then the output will be [7, 37, 79, 49], other answers are also possible.StepsTo solve this, we will follow these steps −for initialize ...

Read More

What are the types of Intrusion-Detection Systems in information security?

Ginni
Ginni
Updated on 03-Mar-2022 1K+ Views

An intrusion detection system (IDS) is an app or device that monitors inbound and outbound network traffic, continuously analyzing events for changes in patterns, and alerts an administrator when it identify unusual behavior. An administrator can reviews alarms and takes actions to delete the threat.For example, an IDS can inspect the data carried by network traffic to look if it includes known malware or other malicious content. If it can identify this type of threat, it sends an alert to the security team so they can investigate and remediate it. Because your team receives the alert, they should act rapidly ...

Read More

C++ program to count number of problems can be solved from left or right end of list

Arnab Chakraborty
Arnab Chakraborty
Updated on 03-Mar-2022 365 Views

Suppose we have an array A with n elements and another number k is there. Consider there are n problems on a contest. Amal's problem solving skill is k. Amal always solves problem from any of the ends of a list. And He cannot solve problem whose difficulty is greater than k. He stops when the left and right problems' difficulty is greater than k. We have to count how many problems he can solve. A[i] represents the difficulty of ith problem.So, if the input is like A = [4, 2, 3, 1, 5, 1, 6, 4]; k = 4, ...

Read More

What is an Intrusion Detection System in information security?

Ginni
Ginni
Updated on 03-Mar-2022 3K+ Views

An intrusion detection system (IDS) is software specifically develop to monitor network traffic and find irregularities. An IDS is designed to detect network traffic and match traffic designs to known attacks. Through this method, sometimes known as pattern correlation, an intrusion prevention system can determine if unusual event is a cyberattack.Because suspicious or malicious activity is found, an intrusion detection system will send an alarm to specified technicians or IT administrators. IDS alarms allows us to rapidly start troubleshooting and identify root sources of problems, or discover and stop harmful agents in their tracks.Intrusion Detection System (IDS) technology is an ...

Read More

What is a Physical Access Control System?

Ginni
Ginni
Updated on 03-Mar-2022 1K+ Views

Physical access control systems are a type of physical security intended to restrict or enable access to a specific area or building. Often, PACS are installed to secure businesses and property from vandalism, theft, and trespassing, and are particularly useful in facilities that needed larger levels of security and protection.Access controls protect against imprudent access of equipment, data documents, and software. It can restrict physical access, a security system should be able to differentiate between authorized and unauthorized individuals. Physical access can be restricted using three general techniques.Identification − Identification based on comparing the physical traits of the individual with ...

Read More

C++ program to find minimum how many coins needed to buy binary string

Arnab Chakraborty
Arnab Chakraborty
Updated on 03-Mar-2022 273 Views

Suppose we have three numbers c0, c1 and h, and a binary string S. We can flip any bit in S. We should pay h coins for each change. After some changes (possibly zero) we want to buy the string. To buy the string we should buy all its characters. To buy the bit 0 we should pay c0 coins, to buy the bit 1 you should pay c1 coins. We have to find the minimum number of coins needed to buy the string.So, if the input is like c0 = 10; c1 = 100; h = 1; S = ...

Read More

What is Natural Disaster in Information Security?

Ginni
Ginni
Updated on 03-Mar-2022 2K+ Views

A disaster is described as a sudden misfortune that is disastrous to an undertaking. Natural disasters contains all types of severe weather, which have the potential to pose an essential threat to human health and safety, property, demanding infrastructure, and homeland security.Natural disasters appears both seasonally and without warning, subjecting the nation to frequent time of insecurity, disruption, and monetary loss. These resources serve to prepare IHEs for several natural disasters, such as winter storms, floods, tornados, hurricanes, wildfires, earthquakes, or any combination thereof.There are specific natural disasters can severely damage the computer system directly, or avoid its operations. These ...

Read More

What are the Physical Threats in Information Security?

Ginni
Ginni
Updated on 03-Mar-2022 11K+ Views

A physical threat is a potential cause of an incident that can result in loss or physical harm to the computer systems. Physical security is represented as the security of personnel, hardware, programs, networks, and data from physical situations and events that can support severe losses or harm to an enterprise, departments, or organization. This contains security from fire, natural disasters, robbery, theft, elimination, and terrorism.Physical threat to a computer system can be as an outcome of loss of the entire computer system, damage of hardware, damage to the computer software, theft of the computer system, vandalism, natural disaster including ...

Read More
Showing 45501–45510 of 61,297 articles
Advertisements