Problem 1: which of the four threats are most dangerous in business.which is the most dangerous for individual.
Problem 2: what are the potential disadvantages to implementing RFID technology in retail industry.
Problem 3: Describe uses and features of unix operating system.
Program 4: write a program that expect a word containing @ as a input. If the word doesn’t has character @ ask to input again, otherwise print the string and terminate the program
Program 5: write a program that accept a word that represents a binary number and Verify that it is a valid binary number or not? If string is not a binary number,again prompt to enter until the valid number is entered. Count how many 1’s in the word If the binary no. has exactly 2 1’s, print “Accepted”, otherwise “rejected”.
Display the count.