1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
2 years ago
9

A timestamp is three numbers: a number of hours, minutes and seconds. Given two timestamps, calculate how many seconds is betwee

n them. The moment of the first
timestamp occurred before the moment of the second timestamp.
Can you put this into python code for me
Computers and Technology
1 answer:
Sonja [21]2 years ago
7 0

hhd fyi ou dfi gd sdi bvb s ujj gr TX cfg y CD vi if dnainfo unlocks Toronto Yazidi

You might be interested in
Fiona is creating a presentation with PowerPoint Online about how pencils are made. She would like to type an explanation about
777dan777 [17]

Answer:THE ANSWER IS A.

Explanation:I DID IT AND I GOT 100

6 0
2 years ago
friend wanted us to decode this message ----- .---- ----- ----- .---- ----- ----- .---- / ----- .---- .---- .---- ----- .---- .-
hodyreva [135]

Answer:

01001001?01110111?01100001?01111001?00100000?01101001?01101011?01100101?01101100?01100001?01111001?00100000?01110101?01101110?01100001?01101100?01100001?01111001?00101110

3 0
3 years ago
A consequence of a buffer overflow error is __________ . A. corruption of data used by the program B. unexpected transfer of con
svlad2 [7]

Answer:

The answer is "Option D".

Explanation:

This error is a part of the programming which allows the information not to be stored in memory. It could lead to errors or an illness, more significantly, and  the buffer is a storage reserved field for computer's memory, in this question all the given choices were true, which can be described as follows:

  • In option A, This error works as a data manipulator in the system.
  • Option B and Option C, both are same in this programming technique Unavoidable data transfer can be controlled.
6 0
3 years ago
Question 8 of 10
Mama L [17]
The correct answer is A
7 0
2 years ago
When securing a system, why is it important to audit failed attempts to access files?
NARA [144]

Answer:

Auditing failed attempts are important because it helps keep track of the activities which may have been attempts to access the secure files without proper authentication. It is important for the security of the sensitive information in the system.

Auditing ensures the safe and secure environment for a system where all the sensitive and important data remains safe by keeping the unauthorized users from accessing it.

Explanation:

Solution

When a failure auditing is enabled, the every time unsuccessful tries to access the files by a user occurs, an audit entry is generated. the files server auditing is a very crucial step towards securing a system.

With a record of all failed trial made to access the file, investigations in a case of breach in data is quite simple. it also helps is identifying the client computer from which the failed attempts were carried out.

Therefore, file auditing is very necessary in securing a system.

7 0
3 years ago
Other questions:
  • Write a Tip Calculator in code in VMware Fusion
    13·1 answer
  • What are multiple worksheets
    7·1 answer
  • Fill in the blank.
    7·1 answer
  • Gini is a manager at a website design firm. She has a timeline prepared for the product to be delivered to the client. She needs
    6·2 answers
  • What are 3 ways to select an entire document?
    15·1 answer
  • Differentiate between trusted-source-security and antispoofing-security techniques.
    10·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • Convert 128 GB into KB​
    8·2 answers
  • When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.
    8·1 answer
  • Guys im getting the ps5 tomorrow :)​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!