1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
12

Edhesive coding practice 3.4​

Computers and Technology
1 answer:
malfutka [58]3 years ago
7 0

Answer:

green= input("Enter the Green")

if(green == "green"):

   print("You have entered correct option")

else:

   print("You have entered wrong option")

Explanation:

We need to explain the if else ladder through the Python program. And the program for it can be found in the answer section.

You might be interested in
Write the HTML to create a hyperlink to the named fragment designated by “top”.
Anna007 [38]

what are you asking for


8 0
4 years ago
The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
Flura [38]

Answer:

The page field is 8-bit wide, then the page size is 256 bytes.

Using the subdivision above, the first level page table points to 1024 2nd  level page tables, each pointing to 256 3rd page tables, each containing 64 pages. The program's address space consists of 1024 pages, thus we need we need 16 third-level page tables. Therefore we need 16 entries in a 2nd level page table, and one entry in the first level page table. Therefore the size is: 1024 entries for the first table, 256 entries for the 2nd level page table, and 16 3rd level page table containing 64 entries each. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 2 (one second-level paget table) + 16 * 64 * 2 (16 third-level page tables) = 4608 bytes.

First, the stack, data and code segments are at addresses that require having 3 page tables entries active in the first level page table. For 64K, you need 256 pages, or 4 third-level page tables. For 600K, you need 2400 pages, or 38 third-level page tables and for 48K you need 192 pages or 3 third-level page tables. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 3 * 2 (3 second-level page tables) + 64 * (38+4+3)* 2 (38 third-level page tables for data segment, 4 for stack and 3 for code segment) = 9344 bytes.

Explanation:

16 E the answer

5 0
3 years ago
Which of the following application architecture do you suggest as the best option for email for an organization? Consider small,
kykrilka [37]

Which of the following application architecture do you suggest as the best option for email for an organization? Consider small, medium and large organizations to provide your suggestions.

1. Two-tier client-server

2. web-based

Answer:

2. Web based

Explanation:

Web based applications provides cloud based email solutions provider that benefits small organisation as much as big organisations because the investment is minimal and affordable and gives no problem in deployment of resources to manage services with no risk.

It provides multiple point access by providing email solutions that enables multiple point of access gives rise to flexibility of access by members of the organisation.

It provides powerful admin control which makes management of email services easy and provides high security for services.

8 0
4 years ago
5. Many large organizations have had their database system hacked and customer data stolen. How should the security for the data
yawa3891 [41]

Answer:

Security is very crucial for any system. Vulnerability can be exposed on different levels which includes database breach, network level attacks and application level attacks. Different kinds of attacks can be carried out for different components. Attacks carried out on databases are different from other kinds of attacks.  

Attacks on databases can be because of any of the following exposed vulnerability.  

  • Poor system design and weak architecture
  • Incorrect configurations  
  • SQL injection attacks  
  • Weak Authentication
  • Brute Force attacks on user credentials
  • Improper privilege mechanisms  
  • Privilege abuse and excessive access.  
  • Poor design and flaws in programming
  • Data loss and information corruption

Security of database systems should be designed by considering best database security design practices. Network security will ensures that all the networks level attacks are detected and mitigated which includes DDOS attacks, Syn flood attacks, Session Attacks, DOS attacks and web security will focus on detecting and protecting attacks on web applications and on application layer attacks. This includes XSS attacks, XML attacks DOS attacks, DDOS attacks, Slow DDOS attacks, JSON violations, Protocol violations etc. However, Security of database will be different than the rest of security and should be based on following best practices

 

  • Physical and Network Access Security.
  • Access control by managing the database access strictly.
  • Encryption of Data
  • Authentication  
  • Web Application Firewalls  
  • Controlling Database Integrations
  • Manual and Scheduled Backups through secured channels.  
  • Auditing and Logging
  • Reporting and Monitoring

Explanation:

<em>Physical and Network Access Security is essential </em>as the database will be hosted on many physical servers or cloud servers. If the databases are hosted on web or cloud servers and gaining access to such servers will eventually give out root user permissions.

Attackers can have control access of databases as root users if they succeed in getting into physical servers.Use of network firewalls and Intrusion detection and prevention systems will provide security against physical system access.

<em>Access control </em> will allow only specific users to access the database. User Based access control will give restricted or policy based privileges to different users. An user will be allowed to perform only certain actions in such cases which will avoid user-access abuse.  

<em> </em><em>Data encryption</em><em> </em>will make sure that eves dropper will not be able to read any data during transmission or during inter process calls. Authentication mechanisms will help to use strong cryptic authentications for users. Use of great encryption, key exchange and hashing algorithms will harden the security and will make databases robust.  

<em> Web Application firewalls</em> will provide a strong security against SQL injection attacks, database connection flood attacks, other web related attacks which will safeguard the databases at the cloud storage and also will block the attacker by flagging them.  

<em>Best coding practices</em> and vulnerability scanning and assessment will secure all the database integrations. <em>Database integrations</em><em> </em>with other components needs to be carried out with utmost care by making sure to analyse all the impacted areas.  

It is always a good practice to have <em>scheduled and manual backup of databases</em> which will be useful against data corruption because of erroneous user actions. This will ensure that data is safe and can be recovered during toxic situations. This will help to control the damage.  

<em> Auditing of logs</em> to verify all the actions performed on the database by different users is necessary as it will help to analyse any misbehavior or compromised user access. <em>Monitoring and reporting</em> will make sure that only the right user has the right access and also it will alert any attacks on the database system.

8 0
4 years ago
Functions<br> of beaker​
pishuonlain [190]

Answer:

Beaker Purpose

Although the purpose of a beaker is to contain and measure liquids, the glassware can come in a multitude of shapes and sizes. Most often, a beaker is cylindrical in shape and has a flat bottom. Some beakers have a small beak or spout to aid in the pouring of liquids.

Here hope that helps know mark me as brill

3 0
3 years ago
Other questions:
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • In the context of web and network privacy, an acceptable use policy is _____.
    15·1 answer
  • Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
    15·1 answer
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    13·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • Which is a good guideline to follow for adding animation to a presentation?. A. Use a different animation for each slide.. B. Us
    8·2 answers
  • To make sound decisions about information security, management must be informed about the various threats facing the organizatio
    10·1 answer
  • Error: 404 Not Found <br>The resource that you requested does not exist on this server.
    14·2 answers
  • Children's Web sites may combine educational and entertaining information and activities with interactive advertising and direct
    5·2 answers
  • 6.1.5: Function definition: Volume of a pyramid.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!