D.) Write down the error message and research the cause based on the message.
Communication: Communication is one way to be connected to
the network and use the internet. It helps maintains communication with other
network users. A few examples include email, IM services, video conferencing,
Skype and many more.
File sharing: Easily sharing files and data. From businesses
to schools to friends, everyone sends files to through internet and this has
become an essential part of life. Various services like Gmail and yahoo mail
are used.
Social networking: This is an essential medium to
communicate with friends and family members. Examples include Facebook,
Twitter, and Instagram.
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
Answer:
Change request.
Explanation:
Most organizations use a change request form to propose and document a maintenance change. A change request form typically comprises of five (5) basic steps and these are;
1. Change request initiation.
2. Change request analysis.
3. Change request resolution or approval.
4. Change request implementation.
5. Change request verification.
Answer:
N = [1,1,1,1,1],
[2,2,2,2,2],
[3,3,3,3,3],
[4,4,4,4,4]
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N=[]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
Explanation:
I got 100%.