1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
11

The work principle is not always true T or F

Computers and Technology
2 answers:
Nimfa-mama [501]3 years ago
7 0
I believe the answer is false !

musickatia [10]3 years ago
4 0
The work principle is not always true

false
You might be interested in
What phone had emojis first?
irina1246 [14]
I believe it was IPhone
3 0
3 years ago
Read 2 more answers
A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
Reptile [31]

Answer:

  1. with(open("numbers.txt")) as file:
  2.    data = file.readlines()  
  3.    runsum = 0
  4.    largest = 0
  5.    
  6.    for x in data:
  7.        if(int(x) > largest):
  8.            largest = int(x)
  9.            runsum += largest  
  10.    
  11.    print(runsum)

Explanation:

The solution code is written in Python 3.

Firstly, open a filestream for numbers.txt (Line 1) and then use readlines method to get every row of data from the text files (Line 2).

Create a variable runsum to hold the running sum of number bigger than the maximum value read up to that iteration in a for loop (Line 3).

Use a for loop to traverse through the read data and then check if the current row of integer is bigger than the maximum value up to that point, set the current integer to largest variable and then add the largest to runsum (Line 6 - 9).

At last display the runsum to console terminal (Line 11).

8 0
4 years ago
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
The Florida PanHanble has almost 60 different types of habitats. Bases on this fact, which statement best describes the Florida
omeli [17]
I believe its C but im not percent sure
8 0
4 years ago
Other questions:
  • When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
    15·1 answer
  • Consolidating a system's physical and time resources is known as ________________.
    13·1 answer
  • Can you find the ip address from a physical address
    13·1 answer
  • A computer is an electronic device operating under the control of instructions stored in its own memory that can accept, manipul
    11·1 answer
  • You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a
    7·1 answer
  • Which tool determines whether or not applications, devices, and computers will work with a new operating system, while maintaini
    13·1 answer
  • If Jake wants to find out if the size of a fruit has any effect on the total sales for the week of that particular fruit, what c
    15·1 answer
  • CLS
    12·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    15·2 answers
  • What computing paradigm can solve a problem by describing the requirements, without writing code in a step-wise fashion to solve
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!