for x in range(5,76,5):
print(x, end=" ")
I wrote my code in python 3.8. Hope this helps
Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Answer:
Map view
Explanation:
The view that will most likely be displayed would be a Map view, where potential customers can see the Klothes for Kats logo, store information, and in-stock products. This is because Local Catalog ads only have a small space that is used to promote what is being advertised. Therefore, in these small spaces the most important things need to be shown in order to attract as many people as possible with what the store offers. The ad needs to have the logo and store information so that the potential customers can easily know what store is being advertised on the ad. The ad also needs to show some of the popular in-stock products in order to attract individuals that are actually interested in the products that the store is trying to sell.
Answer:
ifstream inputFile;
inputFile.open("Friends.txt");
Explanation:
Though, the programming language is not stated, questions like this are often from C++.
The first statement defines the ifstream object using the following syntax.
ifstream [object_name]
In this case, the object name is inputFile
So, the syntax becomes
ifstream inputFile;
The next line opens a file using the following syntax.
[object_name].open("Filename")
Here, object_name is inputFile and filename is Friends.txt
So, the open statement becomes
inputFile.open("Friends.txt")
Answer:
The technician has made a cross-over cable.
Explanation:
The network is a platform that provides two or more computers to communicate. There different types of networks, namely, local-area network (LAN), wide-area network (WAN), MAN or metropolitan-area network etc.
Devices in a network can be connected with cables (ethernet IEEE 802.3) or wirelessly (wifi IEEE 802.11a/n/g). Wiring standards are strictly followed in ethernet configuration.
Two ethernet wiring standards are T568A and T568B. The difference in both standards are the pin configuration and their position in a wire defines a cable system.
When a T568A or T568B are used on both ends of a twisted pair cable, it is called a straight-through cable. When T568A is used on one end and T568B on the other, it is called a cross-over cable.
These cable systems are used for different applications. the straight-through cable is used for connecting devices that are not the same like router to switch, switch to computer etc. The cross-over cable connects similar network devices like router to router, switch to switch etc.