Answer:
The solution code is written in Python 3
1. output = ""
2. with open("text1.txt") as file:
3. data = file.readlines()
4.
5. for r in data:
6. output += r.upper()
7.
8. with open("text2.txt", "w") as file:
9. file.write(output)
Explanation:
Firstly, let's ready a variable output to hold the read data from the first text file (Line 1).
Next, use open function to create a file stream object and use its readlines() method to read all rows of data from text1 (Line 2 -3)
Next create a for loop to traverse through every row of the read data and use upper() function to change all characters in the current row to uppercase and append it to output variable.
Once the entire output string is ready, use open function again to create a file stream object but add "w" as second parameter of the open function (Line 8).
Lastly, use write method to copy the uppercase text held by the output variable, to the new file, text2 (Line 9).
<span>Which is not a component of a database that describes how data is stored?</span>
Answer:
diffused
Explanation:
Diffuse reflection is when light hits an object and reflects in lots of different directions. This happens when the surface is rough. Most of the things we see are because light from a source has reflected off it.
Answer:
Key escrow.
Explanation:
If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>
If the fourth page is what has the most of your information and you can base that one page on your whole topic, and its the only choice you have, then I advise you should do that.