Answer:
- Print the values days of bottles.
- Display total number of bottles collecting.
- Display the payout for this transaction.
Explanation:
Program:-
DEPOSIT_PER_BOTTLE = 0.10
another = "Y"
while another=="Y":
print("Input Values 7 days of bottles:")
total = 0
for I in range(7):
collected_bottles = int(input())
total += collected_bottles
payout = total*DEPOSIT_PER_BOTTLE
print("Total number of bottles collected: {:,}".format(total))
print("Payout for this transaction $%.2f"%payout)
another = input("Do you want to complete another transaction? ").upper()
Answer:
Internet Protocol and Transmission Control Protocol
Explanation:
Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other. They are developed by Bob Kahn and Vint Cerf.
A non-trivial or predictable classification system is preferred in systematics for the reason that, it is <span> repeatable, objective, testable and </span>predictable. Predictable in a way that you <span>get more out of it than what you put in it. Hope this answers your question.</span>
Answer:
A. Helps prevent a system from being fingerprinted by port scans.
B. Can restrict a computer from receiving network traffic.
D. Stop a process or application from launching.
Explanation:
The "host-based firewall" is an important type of<em> firewall software </em>that is being installed into a computer/device in order to allow it to control the network traffic. This enables the host to protect itself from any malware or viruses that may attack. It, primarily, provides a customized protection. Thus, it is more commonly used by <em>small businesses</em> or<em> individual people</em>.
Host-based firewalls allows "packet filtering." This controls the network access which makes it hard for attackers because of the little information that it provides. So, this explains option A. This then prevents a system from being fingerprinted by port scans.
Host-based firewalls can protect the device from unwanted network traffic, so this explains option B. This then restricts the computer from receiving the network traffic.
It can disable programs that are malicious, thereby stopping the launching of those programs. This explains option D.