↳
I’m a fantastic person looking to pay my bills
↳
I am a hairdresser for 23 years looking for different opportunities with benefits Less
↳
I am a hairdresser for 23 years looking for different opportunities with benefits Less
↳
I have the qualifications, experience, and attitude to contribute to your company. I am a quick learner, adaptable, and possess excellent communication and problem-solving skills. Less
↳
I have the qualifications, experience, and attitude to contribute to your company. I am a quick learner, adaptable, and possess excellent communication and problem-solving skills. Less
↳
I have the qualifications, experience, and attitude to contribute to your company. I am a quick learner, adaptable, and possess excellent communication and problem-solving skills. Less
↳
Did you hear back from them?
↳
I have a second round office interview on November 3rd!
↳
hey how did that interview go? what kind of questions do they ask?
↳
#include #include using namespace std; void revstr(string &s, string &buf) { string delims = " \t"; buf = ""; int wsp; int i, j; for (i = 0; i < s.length(); i = wsp + 1) { wsp = s.find_first_of(delims, i); if (wsp == string::npos) { wsp = s.length(); } for (j = i; j < wsp; j++) { buf.append(1,s[wsp - (j-i) - 1]); } buf.append(1, s[wsp]); } } int main() { string str = "Apple Banana Cherry"; string buf; cout << "input = " << str << endl; revstr(str, buf); cout << "output = " << buf << endl; return 0; } Less
↳
The above code is in c++. The first 2 lines ought to read "#include " and "#include " Less
↳
wow, let's try this again; In the c++ code posted above, you need to include the iostream library and string library. Less
↳
Confidentiality, Integrity and Availability*
↳
“These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad. Together, these three principles form the cornerstone of any organization's security infrastructure; in fact, they (should) function as goals and objectives for every security program.” Less
↳
confidentiality, integrity, accountablity
↳
I am available 24/7 whenever wherever
↳
Asap
↳
I am available full time
↳
TCP establishes connection before data transfer is done. In addition, any packet loss during transmission is re-transmitted for reliability. In UDP no connection is established before data is transferred. Less
↳
How long did it take you to get the offer after the inteview ?
↳
Hi
↳
Because they had no tools and no lab to analyze within, I literally hashed them and compared the MD5 to reports online. Every malware analyst knows that this is NOT analysis, but short of building a lab with access to no VM's, having an isolated host, or wasting time by downloading static tools, this is all I could do. Less