Answer:
The solution code is written in Python 3.
- def convertDate(date_string):
-
- date_list = date_string.split("/")
-
- for i in range(0, len(date_list)):
- date_list[i] = int(date_list[i])
-
- return date_list
-
-
- print(convertDate('06/11/1930'))
Explanation:
Firstly, create a function convertDate() with one parameter, <em>date_string</em>. (Line 1).
Next, use the Python string <em>split()</em> method to split the date string into a list of date components (month, day & year) and assign it to variable <em>date_list</em>. (Line 3) In this case, we use "/" as the separator.
However, all the separated date components in the <em>date_list</em> are still a string. We can use for-loop to traverse through each of the element within the list and convert each of them to integer using Python<em> int() </em>function. (Line 5 - 6)
At last return the final date_list as the output (Line 8)
We can test our function as in Line 11. We shall see the output is as follow:
[6, 11, 1930]
Answer: A. passive attacks
Explanation:
Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.
A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.
Methods of carrying out passive attacks.
•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.
•Dumpster driving: Attackers or intruders search for information from discarded computers and
other gadgets, those information can help to attack a network.
Answer:
endl
Explanation:
Note that endl must be free of quotation marks; otherwise, the program will treat it as a string.. The \n Character. The other way to break a line in C++ is to use the newline character
Answer:
Option D is correct.
Explanation:
A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.
The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.
"flat file"
A simple database program whose records have no relationship to one another<span>single</span>