Answer:
import random
print("Hello! I have a random number from 1 to 100! It is your job to try and guess it!")
number = random.randint(1,101)
guess = int(input("start to guess: "))
num_guesses = 1
while guess != number:
if guess > number:
print("lower")
guess = int(input("try again: "))
num_guesses +=1
elif guess < number:
print ("higher")
guess = int(input("start to guess: "))
num_guesses +=1
print("congrats it took you", num_guesses, "tries")
Explanation:
Answer:
Cloud computing
Explanation:
Cloud computing refers to the process of making computer system resources like computing power and data storage available to user on-demand without requiring the user to manage them himself. The computer system resources include servers, applications, networks, services, storage, and others.
It allows data center to be available over the internet to a large number of users.
Cloud computing involves employing a network of remote servers which are hosted on the Internet for processing, storing, and managing data, instead of using a personal computer or a domestic server. Its aim is to ensure a coherence and economies of scaled through resources sharing.
There are two types of cloud computing: enterprise clouds, which its use can be restricted to just one organisation; and public cloud, which is meant for many organisation.
<span>Structured query Is The Answer.</span>
Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.
<h3>What is information security?</h3>
Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.
<h3>The types of security control.</h3>
In Cybersecurity, there are three (3) different types of security control and these include the following:
In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.
Read more on information security here: brainly.com/question/14286078
#SPJ4
By giving wrong answers or cheating I guess