Answer:
Shows the programming checking if num1 is greater than num2
Explanation:
So num1 and num2 are inputs
for you to code this you would need to put
num1=int(input("What is your first number? ))
and the same for num2 except change num1 for num 2 and first for second
When the input is completed, the computer will check if num 1 is greater than num2
it will do this by using a code something like:
if num1>num2:
Print("Your first input was greater than your second")
But in this example if it greater it just ends
But if it was less than you would put
if num1>num2:
Print("Your first input was greater than your second")
elif num1<num2:
Print("Your first input is less than your second")
So basically this code shows the computer checking if one number is greater than the other or not
Answer:
Threat disgruntled employees
Explanation:
This is a type's threat in a network, why disgruntled employees is a threat?
Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.
I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.
In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.
it is title page and give me a ❤
A presentation program<span> is a </span>software<span> package used to display information in the form of a </span>slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the
Answer:
D. Identify the problem.
Explanation:
There are six steps or stages in computer system troubleshooting. They are,
1. Identify the problem: In the stage of troubleshooting, the user is interviewed to get a description of the problem. Reproducing the problem is essential to confirm the described problem of the system before moving to the next stage.
2. Establish a theory of probable cause: when the problem is identified, a list of the possible cause of the problem is made.
3. Test the theory to determine a cause: each items on the list of possible cause of the problem is tested to confirm its actual cause.
4. Resolve the problem.
5. Verify full system functionality
6. Document the findings, actions and outcomes.