Answer:
decode( )
Explanation:
We can use the method decode( ) to decode the string using the codec registered for encoding.
There are two parameters
encoding: We can encode with this parameter.
errors: If used to manage the errors.
For example:
String = "this is string example....wow!!!";
String = Str.encode('base64','strict');
If we print these variables we have:
String = b'dGhpcyBpcyBzdHJpbmcgZXhhbXBsZS4uLi53b3chISE='
String = this is string example....wow!!!
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
Advantages:
It is easy to handle and implement.
It is best suited for small networks.
Disadvantages:
The cable length is limited. This limits the number of stations that can be connected.
This network topology can perform well only for a limited number of nodes.
Answer:
The operating system must by the use of policies define access to and the use of all computer resources.
Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.
Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:
- General Policies
- Server Policies
- VPN Policies
- Back-Up Policies
- Firewall Access and Configuration Policies
Cheers!