Answer:
try:
cardNumber = str(input('Enter your card number her: \n'))
if (len(cardNumber) > 16 or len(cardNumber < 16)):
raise
except:
print ('You have entered an invalid cardNumber.')
else:
if cardNumber.startswith("2"):
print('American Express Card')
elif cardNumber.startswith("4"):
print('Visa Card')
elif cardNumber.startswith("5"):
print('Master Card')
else:
print('Unknown Card')
Explanation:
In the try block section:
The first line prompt the user for input, which is converted to string and assigned to cardNumber variable. The next line test the length of the cardNumber entered, if it is less than 16 or greater than 16; an exception is raise.
In the except section:
An error message is displayed telling the user that he/she has entered an invalid card number.
In the else section:
This is where is program check for type of card using an if...elif...else statement block. If the cardNumber start with 2; an output of "American Express card" is displayed. If the cardNumber start with 4; an output of "Visa card" is displayed. If the cardNumber start with 5; an output of "Master card" is display else "Unknown card" is displayed to the user.
The protocol that should be used to establish a secure network connection for backups is SSH.
<h3>Secure Shell</h3>
SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.
SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:
- Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
- SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
- Perform automatic and secure file transfers.
- Launch commands securely on remote devices or systems.
- Perform secure component management of network infrastructure.
Learn more about Secure network connection: brainly.com/question/28083478
#SPJ4
Variables are used to store information to be referenced and manipulated in a computer program. ... It is helpful to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.
Answer:
Balance
Explanation:
Maintaining balance entails making sure things are in the right place, in the right proportion and maintaining a stable look and stand.
Maintaining a balance on a power point presentation entails that one considers these; ths one should carefully analyse how the different images go together and ensure that the positioning of elements within the images helps to make the individuals point and is pleasing to view.
This can be tasking but worth every effort put in to achieve such, because it will make your presentation to be easier to explain and better understood.