Answer:
salary=float(input("Enter salary : "))
numDependents=int(input("Enter number of dependents : "))
stateTax=salary*0.065
federalTax=salary*0.28
dependentDeduction=salary*0.025*numDependents
totalWithholding=stateTax + federalTax+ dependentDeduction
takeHomePay=salary- totalWithholding
print("State Tax :$",str(stateTax))
print("Federal Tax :$",str(federalTax))
print("Dependents:$",str(dependentDeduction))
print("Salary :$",str(salary))
print("Take-Home Pay:$",str(takeHomePay))
Explanation:
- Take the salary as input from user.
- Take number of dependents as an input from user.
- Calculate the state tax and Federal Tax. Then calculate the independent detection tax by multiplying salary with 0.025 as well as number of dependents.
- After that calculate total withholding and then calculate home pay by subtracting total withholding from salary.
- Finally print all the details.
Answer:
"Social engineering" is the correct answer for the above question.
Explanation:
- Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
- It is used to read the humans data or psychologically hack human data.
- It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
- The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.
As to the hardware store, the neighbor will recover because the consumer's failure to recognize the improper assembly doesn't cut off the stores liability.
<h3>What is hardware?</h3>
It should be noted that hardware means the tangible computer components that run the written instructions.
In this case, as to the hardware store, the neighbor will recover because the consumer's failure to recognize the improper assembly doesn't cut off the stores liability.
Learn more about hardware on:
brainly.com/question/24370161
#SPJ12
Answer:
Option A i.e., AES is correct.
Explanation:
The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.
- Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
- Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
- Option D is also incorrect according to the following scenario because it is the terminal access control.
Answer:
Types of Protocols
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Post office Protocol (POP)
Simple mail transport Protocol (SMTP)
File Transfer Protocol (FTP)
Hyper Text Transfer Protocol (HTTP)
Hyper Text Transfer Protocol Secure (HTTPS)