Answer:
The answer is E: All of the above
Explanation:
All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.
Answer:
A. The function definition must appear before the function is called
Explanation:
Given
The above lines of code
Required
Determine the error in the program
In python, functions has be defined before they are called but in this case (of the given program), the function is called before it was defined and this will definitely result in an error;
<em>Hence, option A answers the question</em>
The correct sequence of the program is as follows:
<em>def evenOdd(n):
</em>
<em> if n % 2 == 0:
</em>
<em> return "even"
</em>
<em> return "odd"
</em>
<em>num = int(input("Enter an integer: "))
</em>
<em>print("The integer is", evenOdd(num))
</em>
<em />
Answer:
def insSort(arr):
ct=0;
for i in range(1, len(arr)):
key = arr[i]
j = i-1
while j >=0 and key < arr[j] :
arr[j+1] = arr[j]
j -= 1
ct=ct+1;
arr[j+1] = key
return arr,ct;
print(insSort([2,1]))
Output of the program is also attached.
a hard copy stores data and information in the form of physical files it may be images text photographs and more a soft copy data and information in the form of virtual file saved on a computer or a drive you can preserve a hard copy for two long because its day subjected to wear and tear