Answer:
<em>Yes</em><em> </em><em>they</em><em> </em><em>are</em><em> </em><em>correct</em><em>.</em><em> </em><em>welcome</em><em>.</em><em>.</em><em>.</em><em>.</em>
Answer:
Explanation:
The following is written in Python and uses exception handling to do exactly as requested. It then goes adding all of the integer values to an array called num_list and finally adding them all together when the function ends.
def in_values():
num_list = []
while True:
try:
num = input("Input non-zero floating point: ")
num = int(num)
if num == 0:
break
else:
num_list.append(num)
except ValueError:
print("No valid integer! Please try again ...")
try:
num = input("Input non-zero floating point: ")
num = int(num)
break
except ValueError:
break
sum = 0
for number in num_list:
sum += number
return sum
Answer:
//variable integer_list to hold a list of integers
DECLARE integer_list
ASSIGN values to integer_list
//variable sum to hold the sum of the elements in the list
DECLARE sum
ASSIGN zero to sum
//loop through the integer_list and sum all it's elements together.
for(int i=0; i<integer_list.size(); i++){
sum += interger_list.get(i)
}
//Show the result of the addition from the for loop
DISPLAY "The sum is " + sum
Explanation:
The above code uses some hypothetical programming language syntax. The second and third lines declare an arbitrary integer list and assign a set of values to it respectively.
The fifth line declares a variable "sum" which will hold the result of summing all the elements in the list. The sixth line initializes "sum" to zero.
The for loop shown iterates through the integer list cumulatively summing its elements.
The result is displayed as written on line 12.
Hope it helps!
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
I can help with two.
Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.
FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.