Answer:
If this is a true or false I guess my answer is true?
Explanation:
Answer:
a=input("Amount in pennies")
b=int(a)
dollars=0
dimes= 0
quarters=0
nickels=0
pennies = 0
dollars = int(b/100)
b= b- dollars *100
quarters=int(b/25)
b=b-quarters*25
dimes = int(b/10)
b = b -dimes*10
nickels=int(b/5)
b=b - nickels * 5
pennies = b
print(dollars)
print(dimes)
print(nickels)
print(pennies)
Explanation:
The required program is in answer section. Note, the amount is entered in pennies.
Answer: (A) full backup
Explanation: A backup strategy is a term used to describe the various effective approach engaged in creating a backup for data or information.
A FULL BACK UP IS THE VARIOUS APPROACH AND SYSTEMS PUT IN PLACE BY A COMPUTER USER OR AN INFORMATION TECHNOLOGY EXPERT IN ORDER TO CREATE AN ADDITIONAL SAMPLE OR COPY OF AN INFORMATION OR A DATA IN S SINGLE BACKUP.
Answer:
you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.
Explanation:
Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.
One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.
Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.
Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.
<h3>Does Apple use the file based encryption?</h3>
It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.
Therefore, Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.
Hence option A is correct.
Learn more about encryption from
brainly.com/question/9979590
#SPJ1