Edmodo is a educational website designed to make learning and teaching easier.
Students can speak with other students about classwork, and the teacher can also communicate assignments and give messages for the entire class.
Of course the teacher can see all of the messages you post, so inappropriate language and not school related conversations usually end up with trouble with the teacher.
I used this site in 7th and 8th grade
for Language arts and Social Studies.
But of course Edmodo can be used with any subject:)
love, the Pineapple.
<3
Answer:
Here is my code below: username = 'Polly1220' password = 'Bob' userInput = input("What is your username?\ n") if userInput == username: a=input("Password?\ n") if a == password: print("Welcome!") else: print("That is the wrong password.") else: print("That is the wrong username.")
Answer and Explanation:
DOS attacks refer to Denial of Service attack. It is a sort of digital attack where a programmer hacks the system of a framework and makes it inaccessible for the clients which results in intruding on the internet providers of the machine.
At the end of the day, access to online administrations is denied for the client. Any sort of system administration can be upset by DOS assaults be it either bank site or an online business site.
Following is one of the defense techniques against DOS attacks:
Using Routers and Firewalls - As switches have rate constraining and access control capacities, so they can be set up in a legitimate manner to stop basic ping assaults by permeating unessential conventions and can likewise stop invalid IP addresses. In any case, the main hindrance for utilizing switches is that they are usually ineffective against an increasingly advanced parodied assault and application-level assaults utilizing substantial IP addresses. Presently here comes the job of firewalls. Firewalls can ensure the system by dismissing all the traffic landing from aggressor's end. This insurance by firewalls depends on basic principles dependent on conventions, ports or the starting IP addresses.
Be that as it may, it is difficult to hinder some mind boggling assaults by these straightforward standards. For instance, if there is a progressing assault on port 80 (web administration), it is beyond the realm of imagination to expect to drop all approaching traffic on this port in light of the fact that doing so will keep the server from serving genuine traffic.
One detriment of firewall is that Firewalls can close down a particular stream related with an assault, however like switches, they can't perform hostile to ridiculing.
<u>Explanation:</u>
<em>Remember,</em> peripheral devices are portable devices connected to a computer in other to add more functionality to the computer system such as a printer, mouse, hard drive, CD-ROM, etc.
A really cool type of peripheral that could be developed in the future is a voice-enabled mouse that can perform normal operations on the computer.
Answer:
f. Configure the speed 100 and duplex full interface subcommands
Explanation: