Answer:
The answer is "Option c and Option d".
Explanation:
A diagram for a case use is a UML dynamic or computational diagram, that is used in the case diagram model. It consists of a set of actions, services, and functions to be carried out by the system. and The class diagram refers to relationships between the UML classes and the source code that dependence, that is two diagrams that affect the system and others are wrong, which can be explained as follows:
- In option a, It is used for business process, that's is not correct.
- In option b, It is used for both professionals industry like software and business, that's why it is wrong.
- In option e, It is used in only high-level language, that's why it is wrong.
- In option f, It is used to adjust its layout that's why it is wrong.
def zipZapZop():
number = int(input("Enter the number: "))
dictionary = {3: "zip", 5: "zap", 7: "zop"}
amount = 0<em> #amount of non-divisible numbers by 3, 5 and 7</em>
<em> for key, value in dictionary.items():</em>
if(number%key == 0): <em>#key is the number</em>
print(value) <em>#value can be or zip, or zap, or zop</em>
else: amount += 1 #the number of "amount" increases every time, when the number is not divisible by 3, or 5, or 7
if(amount == 3): print(number) <em>#if the number is not by any of them, then we should print the number</em>
zipZapZop()
Answer:
Meaning:
PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT
STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE
X REQUEST ANY INFORMATION.
Explanation:
Playfair cipher invented in 1854 by Charles Wheatstone was the first practical digraph substitution cipher. Lord Playfair promoted the use of the cipher, therefore it was named after him. Playfair cipher encrypts pairs of letters (digraphs) making it hard to break. Frequency analysis can still be undertaken but requires much more cipher text in order to work. It requires no additional equipment to operate and is very fast therefore it is to protect information during war. It was used by British forces in the Second Boer War and in World War I and during World War II by the Australians.
When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in the morning of the 2 of August 1943 in Playfair code:
KXJEY UREBE ZWEHE WRYTU HEYFS
KREHE GOYFI WTTTU OLKSY CAJPO
BOTEI ZONTX BYBWT GONEY CUZWR
GDSON SXBOU YWRHE BAAHY USEDQ
Meaning:
PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT
STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE
X REQUEST ANY INFORMATION.
There are six basic functions of IT.
1. Capture: Compiling detailed records of activities.
2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.
3. Generation: Organizing information into a useful form.
4. Storage: Retaining information for further use.
5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.
6. Transmission: Distributing information over a communication network.
Answer:
Im unclear exactly what it is saying but i think its 2