Answer:
down below
Explanation:
score = input() # gets student's score input
max = input() # gets max number
percent = (score/max)*100 # multiply by a hundred to get percentage
if percent > 52: # checks if percent is greater than 52
print("well dont you have at least a grade 5")
else # if percent is less than or equal to 52 it will print this instead
print("Unlucky, you need to revise more for the next test.")
THIS PART IS NOT CODE:
make sure you indent/tab the print statements or else you'll get an error
Answer:
C: disruptive technology era
Explanation:
There are five main stages in IT infrastructure era and the are, in order from the oldest to the newest; the mainframe and minicomputer era, the personal computer era, the client/server era, the enterprise era, and the cloud computing being the newest in the five stages eras of IT infrastructure.
Yes there is a way, you can just go to the backup/system operating system and delete/archive the update, but its only a limited amount of time though, and to be honest with most software, its very hard to downgrade an update, that requires professional skills, but there is a way. If you want try looking up how to downgrade an update for ios on google search and that should help you.
Answer:
Data at the following addresses will be as following:-
200 :- 34
201 :- 12
202 :- 78
203 :- 56
Explanation:
If there is 1 byte storage.
if the data is of 4 digits.Then we have to store it in 2 memory locations.
The first two digits will be stored at the higher byte address that is 201 and the last two digits will be stored at then lower byte address that is 200.
The case is same with the next data 5678.
At address 202 :- 78 will be stored and at address 203 :- 56 will be stored.
Answer:
Option C is the correct answer for the above question.
Explanation:
Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.
The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-
- Option A states about direct mail which is not a type of attack.
- Option B states about instant messaging which is also not a type of attack.
- Option D states about spam which is used to send the spam messages.
- Option 'E' states about the mass mail which is used to send the lots of spam mail.