Illegal access to a system
Answer:
shortNames = ['Gus', 'Bob','Zoe']
Explanation:
In this assignment, your knowledge of list is been tested. A list is data structure type in python that can hold different elements (items) of different type. The general syntax of a list is
listName = [item1, "item2", item3]
listName refers to the name of the list variable, this is followed by a pair of square brackets, inside the square brackets we have items separated by commas. This is a declaration and initialization of a list with some elements.
The complete python code snippet for this assignment is given below:
<em>shortNames = ['Gus', 'Bob','Zoe']</em>
<em>print(shortNames[0])</em>
<em>print(shortNames[1])</em>
<em>print(shortNames[2])</em>
Answer:
PSTN
Explanation:
The full form of PSTN is Public Switched Telephone Network. It is a traditional circuit-switched telephone network which is used by the several regional, local or national telephony operators. They came in used in 1800s. It is a form of communication among the people which works with the help of underground copper wires.
In the context, when I am travelling through the metropolitan as well as the rural areas of the North America, the PSTN provides the internet connectivity in all the places. It helps me to communicate with the other people with the help of a telephone.
Answer:
Explanation:
There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.
This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.
En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.