Answer:
player1Wins = player1Losses = player2Wins = player2Losses = tieCount = 0
score1 = 10
score2 = 10
if score1>score2:
player1Wins=player1Wins+1
player2Losses=player2Losses+1
print("player1 wins")
elif score2>score1:
player2Wins=player2Wins+1
player1Losses=player1Losses+1
print("player2 wins")
else:
tieCount=tieCount+1
print("tie")
Explanation:
Since your indentation can not be understand what you give us, please try to do it as you see in the answer part.
Although it seems that this is a part of the code, it is normal that you get errors. However, since you keep track of the variables, it is better to initialize the variables that will keep the counts. Since initially, they are 0, you may set them as 0. Also, if you assign the values to the scores, probably you would not get any error. This way, you may test your code as I did.
Other than these, in the else part you do not need to write "score1=score2", because if score1 is not greater than score2 and if score2 is not greater than score1, this already implies that they are equal
The purpose of the operating systems is to provide an interface between the user and hardware. It's mange all resources, for example; memory, processors, and disk space. It's also mange how to file and store data in a computer system.
Answer:
1. True
2. True
3. False
4. False
Explanation:
1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.
The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.
Hence, it helps to ensure that data can be modified only by appropriate mechanism.
2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.
3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.
4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.