Keyboard-Input
Mouse-Input
<u></u>Monitor-Output
Speakers-Output
Printer-Output
Hard Drive<span>-Output</span>
Answer:
def check_password(pwd):
c=0
d=0
for i in pwd:
if (i>='a' and i<='z') or (i>='A' and i<='Z'):
c+=1
elif i>='0' and i<='9':
d+=1
c+=1
if len(pwd)==c and d>=2 and len(pwd)>=8:
print("valid password")
else:
print("Invalid password")
ps=input("Enter password for checking : ")
check_password(ps)
Explanation:
- Loop through the password and check if it contains any alphabet.
- Increment the counter if it contains any alphabet.
- If it contains a number, increment both c and d variables.
- Finally display the relevant message.
Answer:
Communication
Explanation:
Communication is the most common thing to do on your device .
- <em>Take stock. Know what personal information you have in your files and on your computers.</em>
- <em>Scale down. Keep only what you need for your business.</em>
- <em>Lock it. Protect the information that you keep.</em>
- <em>Pitch it. Properly dispose of what you no longer need.</em>
- <em>plan </em><em>ahead</em>
<em>hope </em><em>it</em><em> helps</em>
In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks.
<h3>What are cyberattacks?</h3>
A cyber attack is known to be a form of an online assault that is said to be launched by a lot of cybercriminals through the use of one or more computers against a single or a lot of computers or networks.
Note that In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks as it is an online assault.
See options below
a. establishes military superiority
b. can be both victim and perpetrator of cyberattacks
c. places a low priority on cyberattack protection
d. has nothing to fear from cyberattacks
Learn more about computer virus from
brainly.com/question/26128220
#SPJ1