Answer:
def sublist(aList):
new_list = []
for s in aList:
if len(s) < 4:
new_list.append(s)
return new_list
Explanation:
Create a function called sublist that takes one parameter, aList
Inside the function, create a new_list that will hold the strings which are less than 4 characters. Create a for loop that iterates through the aList. If a string in aList is less than 4 characters, add it to the new_list. When the loop is done, return the new_list
Answer:
c. It's a high security risk to store that kind of data.
Explanation:
A credit card has a lot of important and personal data of the user, for this reason, allowing software, even commercial software to have access to this information, can promote a high security risk, because frauds can occur that promote damage to the user. For this reason, it is important that before providing the data, the user knows the software very well.
Answer:
Explanation:
import java.util.Scanner;
public class KboatTriangleAngle
{
public static void main(String args[]) {
Scanner in = new Scanner(System.in);
System.out.print("Enter first angle: ");
int a1 = in.nextInt();
System.out.print("Enter second angle: ");
int a2 = in.nextInt();
System.out.print("Enter third angle: ");
int a3 = in.nextInt();
int angleSum = a1 + a2 + a3;
if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {
if (a1 < 90 && a2 < 90 && a3 < 90) {
System.out.println("Acute-angled Triangle");
}
else if (a1 == 90 || a2 == 90 || a3 == 90) {
System.out.println("Right-angled Triangle");
}
else {
System.out.println("Obtuse-angled Triangle");
}
}
else {
System.out.println("Triangle not possible");
}
}
}
OUTPUT:
Answer: (D) Database design follows the twelve principles proffered by Dr. Edgar F. Codd
Explanation:
The relational database is basically based on the relational model of the data which is proposed by the Dr Edger F. codd and he mainly introduced the twelve basics principle of the database designing in the database system. He also contributed various valuable principle in the computer science.
The twelve principle are:
- The first rule of the relational database is the information rule as it represented all data or information
- Independence of the integrity
- Viewing various updating rule
- Logically treatment of various NULL value
- Independence of the physical database
- Distribution in-dependency
- Various delete, insert and update rules
- The overall logical description of the database are basically stored in the database directory
- There is no subversion rule
- There is guarantee accessing rule
- Proper rule for data language
- The relational database level actions
Answer:
Peer-to-Peer applications
Explanation:
According to my research on information technology, i can say that based on the information provided within the question this is the basis for Peer-to-Peer applications. Like mentioned in the question P2P applications refers to the sharing of information between two privately owned computers connected to the internet. Some popular software's that use this feature are Skype, Ares, and Popcorn Time.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.