Answer:
import java.util.Scanner;
public class BarChart {
public static void main(String[] args) {
Scanner sc=new Scanner(System.in);
//take input from user
System.out.println("Enter Score");
int score=sc.nextInt();
int count=score/10;
int i=1;
//print horizontal bar
//if you want to print vertical bar then simply change into print which is replace by println
while(i<=count)
{
System.out.print("*");
i++;
}
}
}
Explanation:
Answer:
Answer explained below
Explanation:
I have given two approaches in implementing the solution.
1. Using the for loop, in which you have to iterate over all the elements in list 1 and check in list 2
2. Use the set intersection method. As intersection will give u the common elements. And we can get there length by using len method.
I have added the code along with the snapshot and inline comment for the ease of you to understand. Please check the methods below. You can use either of them.
METHOD-1:
********** CODE *****************
def matches(tickets,winner):
tickets = set(tickets)
winner = set(winner)
counter = 0 #To Count the common elements
for i in tickets: # Iterate over all the elements in tickets.
if i in winner: # Check the element in the winner list
counter = counter+1
return counter
METHOD -2:
********** CODE ********************
def matches(tickets, winner):
tickets = set(tickets)
winner = set(winner)
return len(tickets.intersection(winner))
Explanation:
the output of your code is 30
<span>Intangible system is that system whose services are not visible</span>
Answer: data loss protection
Explanation:
In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.
It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.
So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.