Answer:
# create the file
filename = "Testfile.txt"
# for writing, we create the output file:
outPutfile = open(filename, "w")
# Writing numbers from 1-100
for item in range(1,101):
outPutfile.write((str)(item))
outPutfile.close()
# printing the contents to verify it worked correctly
infile = open(filename, "r") #note the "r" indicates the mode
fileContents = infile.read()
infile.close()
print(fileContents)
Explanation:
- Define the working file fileName = TestFile
- Create the output file for writting outPutfile = open(filename, "w")
- Use a for loop to write numbers from 1-100 to the file outPutfile.write((str)(item))
- Close the file outPutfile.close()
- You may open the file read its content and print the contents to verify it worked correctly
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Answer:
Java provide all the ADTs you need,therefore you do not need to create any newones.
This statement is not true.
Explanation:
ADTs are those data types which we use but we didn't know their inner working that is how it is working what is happening inside.It is commonly used for Data Structures for example:- In stack we use push and pop operations to insert and to delete element from a stack respectively but we didn't know how it is happening inside.How the stack is implemented and etc.Java provides most of the ADT's but not all.
Answer:
Explanation:
The results would be exactly the same. We have learned little about authority and when to oppose it.
I'll give you an example. Last night I was in a restaurant like Taco Bell or Subway. Across from me was a girl with an ordinary backpack which was all I could see. It was quite common to see that in the University District where I was. I paid no attention until two policemen came in (both over 200 pounds -- she was tall but could not have been more than 130) and began arrest procedures. She started shouting very foul language but otherwise did not resist. They put handcuffs on her wrists which were behind her back. Again she she used profane language only screaming that they were hurting her. It took the one police officers a moment to find his key and loosen the cuffs, which he did, but she was still uncomfortable and cursing.
She was silent as they took her out. Nobody questioned the incident at all. Do you think Dr. Millgram would recognize this as an example of his theory? I'm sure he would. Trust me, this was not staged. There was a 3rd officer who drove the girl and one of the 2 arresting officers away.