Answer:
Scanning and enumeration.
Explanation:
In the scanning and enumeration phase of the ethical hacking methodology, a hacker would be expected to discover available targets on a network.
The scanning and enumeration phase of the ethical hacking follows the reconnaissance phase and it typically involves discovering available targets on a network for informations such as username, password, IP address etc.
Paths describe the location of folders and files on your computer. If you have saved your work to c:\documents, then your work has been saved to your
A. computer’s hard drive.
B. flash drive
C. student drive
D. OneDrive
Answer:
la ventana de micros word
You should see the following code in your programming
import simplegui
def draw_handler(canvas);
# your code goes here
frame = simplegui.create_frame('Testing', 600, 600)
frame.set_canvas_background("black")
frame.set_draw_handler(draw handler)
rame.start()
Answer:
import simplegui
import random
def draw_handler(canvas):
for x in range(1000):
colorList = ["Yellow", "Red", "Purple", "White", "Green", "Blue", "Pink", "Orange"]
c = random.choice(colorList)
x = random.randint(1,600)
y = random.randint(1,600)
canvas.draw_point([x, y], c)
frame = simplegui.create_frame('Testing', 600, 600)
frame.set_canvas_background("Black")
frame.set_draw_handler(draw_handler)
frame.start()
Explanation:
I used a for loop, setting my range to 1000 which is how you create exactly 1000 points. Next, I defined my color array, my x randint value, and my y randint value. I set both the x and y randint values to 1 - 600 since the frame is 600x600. The rest is pretty self explanatory.
Question #1
Dropdown
You entered the following line of code in IDLE.
>>> guess = input("Enter a guess: ")
This is the result.
Enter a guess: 2
What data type is the variable guess?
string
int
float
Answer:
int
Explanation:
Here is the input:
"Enter a guess: 2"
The input is the number. The type of variable for whole number (number without a decimal point) is integer, or int in short form.
If the input would be:
"Enter a guess: Hello"
Then the type of variable would be string, because it's a text input.
And if the input would be:
"Enter a guess: 1.5"
Then the type of variable would be float, because it's a number with a decimal place.
In the variable guess the type of data type is int. The correct option is B.
What is a data type?A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming.
Integral, Floating Point, Character, Character String, and Composite types are the five basic kinds of data types that are recognised by the majority of current computer languages.
Each broad category also includes a number of particular subtypes.
The most common integer data type in SQL Server is the int data type. When integer values may be larger than what the int data type can handle, the bigint data type is meant to be used.
Thus, the correct option is B.
For more details regarding data type, visit:
https://brainly.com/question/14581918
#SPJ5
Have any of you guys had to deal with not seeing profile pictures or not being able to open PDFs on this website? Is it just me or an overall glitch of the Brainly system?
The following code will not compile. Which of the options below would allow the code to compile and run as intended?
if (x >= -10 and <= 10):
print("In range")
Answer:
Follows are the code to this question:
x=int(input())#use input method with int that takes integer value from user-end
if (x >= -10 and x<=10):#defining if block that checks x in between -10 to 10
print("In range")#print message
Output:
6
In range
Explanation:
In this code, the choices were missing that's why the solution to this question can be defined as follows:
In this, x variable using the input method with the int, which takes integer value from the user-end. In the next step, the if block is used, that checks x value lies on between the -10 to 10, to check this condition it used the and logical operator, that run the code when both conditions are true, and at last, it prints the message "In range".
E-mail is a special form of business communication.
is the set of rules that governs communication using e-mail.
Answer:
Your answer would be 'Netiquette ' .
Hope this helped you out :D
Which is an example of a good URL?
hellllllllllp i need hlel dad
Write atleast 3 targeted audience or users
Answer:
Three categories of audience are the "lay" audience, the "managerial" audience, and the "experts." The "lay" audience has no special or expert knowledge. They connect with the human interest aspect of articles.
Explanation:
Lay
Managerial
Experts
What is the first phase in which a software program is usable enough to test?
A.
Pre-alpha release
B.
Feature complete
C.
Alpha release
D.
Beta release
Answer:
Alpha release
Explanation:
Pre-alpha refers to all activities performed during the software project before formal testing.
The alpha phase of the release life cycle is the first phase of software testing.
A feature complete version of a piece of software has all of its planned or primary features implemented but is not yet final due to bugs, performance or stability issues.
A Beta phase generally begins when the software is feature complete but likely to contain a number of known or unknown bugs.
Sean is a lineman who is always on call to travel whenever there is a natural disaster. He has recently been called to help repair downed power lines for those who have been affected by a hurricane. What Energy cluster pathway does Sean work in? Environmental Resources Energy and Power Technology Telecommunications Plant Systems
Answer:
Energy and Power Technology
Explanation:
Energy and Power Technology is a field in engineering that typically deals with generation, transmission and distribution of electric energy to the end users. This energy are usually transmitted and distributed through the use of overhead cables running from the point of generation to the location of the end users.
Natural disasters such as hurricane, tornadoes, earthquake, etc., are capable of destroying the power lines (cables) as they are usually hung on poles.
In this scenario, Sean is a lineman who is always on call to travel whenever there is a natural disaster. He has recently been called to help repair downed power lines for those who have been affected by a hurricane. Therefore, the Energy cluster pathway that Sean works in is Energy and Power Technology.
can someone help me on codehs. its 7.1.5: initials. here is what your supposed to do
Write a function called initials that will take a first and last name and return their initials using the following format:
initials("Tracy", "Turtle")
# => "T.T."
initials("Peter", "Parker")
# => "P.P."
Answer:
first = input( "What is your first name? " )
last = input( "What is your last name? " )
def initials():
print ("Your initials are: "+first[0]+"."+last[0]+".")
initials ()
Explanation:
it works when I test but it won't submit. Hope this helps
Following are the program to prints the initials of the input value.
Program Explanation:
Defining a class Main.Inside the class, a method "initials" is declared that takes two string variables "first, last" in the parameter.Inside the method, a return keyword is defined that uses the charAt method that returns the first character value of the parameters. In the next step, the main method is defined.Inside the main method, a print method is declared that calls initials method that accepts value in the parameter and prints its value.Program:
public class Main //defining a class Main
{
static String initials(String first, String last)//defining a String method initials that input two variables in the parameter
{
return first.charAt(0)+"."+last.charAt(0)+".";//using charAt method that returns first character value
}
public static void main(String[] as) //defining main method
{
System.out.println(initials("Tracy", "Turtle"));//using print method that calls initials method that accepts value in parameter
System.out.println(initials("Peter", "Parker"));//using print method that calls initials method that accepts value in parameter
}
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/2810164
does anybody know how to unlock websites from school computer
Answer:
yes go to settings then apps
Explanation:
that's how I did mines
Gina, an IT professional, noticed that the servers were running very slowly. She evaluated the system and made a recommendation to the workers at her company to improve the performance of the system. She told them that the most important thing they could do to help was to _____.
stop opening attachments
delete unneeded e-mail
log off the system for at least two hours each workday
limit the number of e-mails they replied to each week
Answer:
delete unneeded e-mail
Explanation:
this will free up space
Explanation:
once you delete unneeded emails you wont have an risk for an slower functioning work day
How many comparisons will be done to find 8 in this list using a linear search?
2, 4, 6, 8, 10, 12
Answer:
I think 4 comparisons
Explain why configuration is essential in planning a project.
Answer:
Configuration management system helps in managing versioning of project management plans, documents and project components. This system may include Change Control System. Because the major cause of taking a new version for a component, document or plan in a project is a change
Lilly is new to her company. Give Lilly some advice about effective communication in an e-mail. Include a subject line.
Effective communication is an important aspect throughout all aspects of life, but it is especially important when in a new job. This is because your communication, or even lack of communication could very likely change you or a co-workers life. For example, let's say a co-worker needed you to do something, and you couldn't do it, but didn't tell them, then they could get into trouble and potentially fired for not doing the work that they entrusted to you. In some cases, they'll blame you, and you can get fired.
Where do you place the logical test argument in an IF function formula?
.before the IE function
.the first argument listed after IF
.the second argument listed after IF
.the third argument listed after IF
Answer:
The first argument listed after IF
Explanation:
When the two variables are listed next to each other, Excel will find and calculate the correlation between them.
Answer:
B. the first argument listed after IF
Explanation:
An else statement will be executed in what situation?
the if statement is true
the if statement is false
there is a syntax error
the elif statement is executed
Answer:
The second one.
Explanation:
An `else` statement is like the alternative route for the code. I like to put it in my own words like, "If the user puts a number insted of a letter tell them they did a good job! Else(Otherwise) Tell them they need to try again.
I hope I helped!
Answer:
b) the if statement is false
Explanation:
The else statement is performed if the if statement's condition is not fulfilled. An else statement executes if an if statement is false. The else statement gives the code a backup if the if statement fails. If the if statement fails, this might propose a different course of action.
An if statement may test whether an integer is even or odd by dividing it by two. This tells the computer whether the number is even or odd. If the input number is divisible by 2, the software will print "the number is even" if it is the computer that determines whether the number is even or odd. If the input number is divisible by 2, the software will print "the number is even" if it is. The else statement may show that the "number is odd" if the integer cannot be divided by two.
When a guest is wearing the medallion, they can order a drink with their smartphone or open their cabin door automatically by standing in front of it. Which emerging technology does Cloud combine with to enable this medallion's features?
Answer:
The Ocean Medallion.
Explanation:
The Ocean Medallion is a handheld interface that, on boarding a cruise liner, digitally attaches to multiple devices. They could order a cocktail with their mobile or instantly open the cockpit door by walking in front of something while a guest wears the ocean medallion.
4.2.10: Multiplication Table: Create a program using a for loop which will print out the 4’s times table through 10.
I included my code in the picture below. Best of luck.
12) --- In-Excel, Columns-are-labelled as
a) +A, B, C, etc
b)+1,2,3.etc
C-A1, A2, etc. 1
d)+ $A$1, $A$2. etc. I
Answer:
C-A1, A2, etc.
True or False? Jerry's company is beginning a new project, and he has been assigned to find a telecommunications tool that will improve operational efficiency. He lists the tasks that he wants the tool to be able to do. Then he does some research to find out what is available. The only thing remaining for Jerry to consider is where he can get the best deal on the technology.
Answer:
True
Explanation:
Answer:
It's false it took the assessment
You want to ensure that a project team can only access the files specifically created for them, and no other files. Which term is most correct in describing this configuration?
Answer:
Least privilege model.
Explanation:
In Computer science, the least privilege model can be defined as an information security model which typically involves giving a user the minimum level of permission, access or rights required to perform his or her duties, tasks or job functions.
In this scenario, you want to ensure that a project team can only access the files specifically created for them, and no other files. Thus, the term which is most correct in describing this configuration is least privilege model.
Basically, the least privilege model ensures a particular user is only given the barest minimum of rights, permission or access needed to perform a task.
When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
Answer:
When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
Explanation:
When the CPU executes the instructions, it interprets the opcode part of the instruction into individual microprograms, containing their microcode equivalents. Just so you know, a full assembly instruction consists of an opcode and any applicable data that goes with it, if required (register names, memory addresses).
The assembly instructions are assembled (turned into their binary equivalent 0s and 1s, or from now on, logic signals). These logic signals are in-turn interpreted by the CPU, and turned into more low-level logic signals which direct the flow of the CPU to execute the particular instruction.
(I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
left-clicking on the appointment and hitting delete on the keyboard
double-clicking on the appointment and hitting delete on the keyboard
right-clicking the Calendar folder and hitting delete on the keyboard
clicking the Calendar folder and hitting delete on the keyboard
Answer:
right clicking should be your answer
In a particular spreadsheet, the data in each cell is password protected. When cells are selected, the formula is visible
in the formula bar. Which is true?
O The cells are locked and hidden.
The cells are locked and unhidden.
The cells are unlocked and hidden.
O The cells are unlocked and unhidden.
Answer:
Explanation:
Locked and hidden
Choose the type of error described.
______ occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added
______ occurs when you use the wrong punctuation, such as print 'hello' without parentheses
______ occurs when the program starts running, but encounters an error such as trying to divide by zero
A. runtime
B. logical
C. syntax
Answer:
first scenario: B
second scenario: C
third scenario: A
hope this helps! :-)
Answer:
1.logical occurs when result is wrong
2.syntax occurs when the wrong punctuation is use
3.runtime occurs when program starts running
Explanation:
A MailTip is an instantaneous pop-up message that
warns users of bad email addresses.
forces the sender to check their grammar and spelling.
gives you real-time information about the message you are creating.
provides helpful hints on how to navigate the message controls.
Answer:
its (c)
Explanation:
What does the Python print() function do?
Completes a calculation
Displays a string value
Sends a document to the printer
Shows a keyword
Answer:
B. Displays a string value
Answer:
the guy above is right
Explanation: