Answer:
Answer explained below
Explanation:
I have given two approaches in implementing the solution.
1. Using the for loop, in which you have to iterate over all the elements in list 1 and check in list 2
2. Use the set intersection method. As intersection will give u the common elements. And we can get there length by using len method.
I have added the code along with the snapshot and inline comment for the ease of you to understand. Please check the methods below. You can use either of them.
METHOD-1:
********** CODE *****************
def matches(tickets,winner):
tickets = set(tickets)
winner = set(winner)
counter = 0 #To Count the common elements
for i in tickets: # Iterate over all the elements in tickets.
if i in winner: # Check the element in the winner list
counter = counter+1
return counter
METHOD -2:
********** CODE ********************
def matches(tickets, winner):
tickets = set(tickets)
winner = set(winner)
return len(tickets.intersection(winner))
Answer:
Customized Toolbar, theme, design, autosave file location, ribbon tabs and groups, quick access buttons, username
Explanation:
The protocol that should be used to establish a secure network connection for backups is SSH.
<h3>Secure Shell</h3>
SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.
SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:
- Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
- SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
- Perform automatic and secure file transfers.
- Launch commands securely on remote devices or systems.
- Perform secure component management of network infrastructure.
Learn more about Secure network connection: brainly.com/question/28083478
#SPJ4
<u>Explanation:</u>
a.
- One user can read the private data of another user-privacy.
- One user can prevent another user from getting anything done-denial of service.
Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.
b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.