Answer:
- def show_students(message, sList):
- print(message)
- print(sList)
-
- print("Our students are currently in alphabetical order")
- sList.sort()
- output = ""
- for student in sList:
- output += "-" + student
- print(output)
-
- print("Our students are currently in reverse alphabetical order")
- sList.sort(reverse=True)
- output = ""
- for student in sList:
- output += "-" + student
- print(output)
-
- show_students("Welcome to new semester!", ["Aaron","Bernice", "Cody"])
Explanation:
Firstly we declare a function that will take two inputs, message and student list (Line 1).
In the function, we first print the message and the original input student list (Line 2 - 3). Next, we use sort method to sort the input list and then output the sorted items from the list using a for loop (Line 5-10).
Next, we sort the list again by setting reverse = True and this will sort the list in descending order (Line 13). Again we use the similar way mentioned above to output the sorted items (in descending order) using a for loop (Line 14 -17)
We test the function using a sample student list (Line 18) and we shall get the output:
Welcome to new semester!
['Aaron', 'Bernice', 'Cody']
Our students are currently in alphabetical order
-Aaron-Bernice-Cody
Our students are currently in reverse alphabetical order
-Cody-Bernice-Aaron
A. IT professional, who maintains the network, must be added and removed from the network. - risk
B. Clients work independently; therefore, if one computer is not working, other computers can still do their jobs. - benefit (scalability is always a benefit)
C. Security levels are set up by individuals; therefore, these networks may not be as secure. - risk
D. There is no need for a big IT department to keep the network up and running. - benefit (it is simple for maintenance)
Answer:
134
Explanation:
because 6.00×10-9 =51 and 1.80×10-8=10 and 8.00×10-7=73 by adding them it will give the answer out by the figuer 134
The answer is Tailoring the baseline to their needs.
After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.