1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
monitta
3 years ago
5

HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!

Computers and Technology
1 answer:
Alex777 [14]3 years ago
4 0

#This is a way without a loop

friends = list(map(str,input("Enter Names: ").split()))

print(sorted(friends))

#This is a way with a loop (for&&while)

friends = list(map(str,input("Enter Names: ").split()))

cool = True

while cool:

   cool = False

   for i in range(len(friends)-1):

       if friends[i] > friends[i+1]:

           coo = friends[i]

           friends[i] = friends[i+1]

           friends[i+1] = coo

           cool = True

print(friends)

You might be interested in
Which are options for levels of junk e-mail protection in outlook 2010? Check all that apply.
Alexus [3.1K]
Im pretty sure it  
<span>No automatic filtering
Partial automatic filtering
</span><span>Safe lists only
</span><span>High

</span>
6 0
2 years ago
Read 2 more answers
Nick is moving from Alabama to Texas. A friend of his remarked that Nick may have to pay higher taxes there. What is the cheapes
Taya2010 [7]

Answer:

d is look up the Texas state website

Explanation:

because tell u about texas and taxes

3 0
2 years ago
_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network
Dmitriy789 [7]

Answer:

Drive-by hacking

Explanation:

Drive-by hacking simply put is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Hackers are always and constantly in need of ways to install malware on your computer. They of make use of email, shady executable files and Internet web pages. A drive-by download is one method that uses the Internet and web pages to install malicious software on your computer.

The aim is to to remotely attack your data either to steal information or to disrupt operations.

4 0
2 years ago
1.
kodGreya [7K]
1. All of the above. the input devices have various sensors throughout the car deliver data to the computer, the output has various actuators have their actions controlled by data. Same thing goes with storage. 

2. CPU. The central processing unit (CPU), also called processor, is located inside of the computer case on the motherboard. Its job is to carry out commands.

3. Operating system. The operating system is system software that manages computer hardware and software resources  and provides common services for computer programs. 

4. Utility. The Utility software is system software designed to help analyze, configure, optimized or maintain computer.

5. TB. Terabytes (TB): 1,099,511,627,776 or 2^40.

Hope this helped :)
Have a great day 
3 0
3 years ago
A technician has installed an IPS appliance on the network. Which of the following is the purpose of that installation?
Scrat [10]

Answer:

B

Explanation:

Stands for "Intrusion Prevention System." An IPS is a network security system designed to prevent malicious activity within a network. It is often used in combination with a network detection system (IDS) and may also be called an intrusion detection and prevention system (IDPS).

Like an IDS, an IPS may include hardware, software, or both. It may also be configured for a network or a single system. However, unlike IDSes, intrusion prevention systems are designed to prevent malicious activity, rather than simply detecting it.

When an IDS detects suspicious activity, such as numerous failed login attempts, it may log the IP address. If it detects a suspicious data transfer, it may check the packets against a database of known viruses to see if any any malicious code is being transferred. When an intrusion detected, an IDS compares the activity to a set of rules designed to prevent malicious activities from taking place. For example, when an IDS detects numerous failed logins, it may block the IP address from accessing any network devices. If it detects a virus, the data may be quarantined or deleted before it reaches its destination.

Examples of hardware-based IPSes include Cisco's IPS 4500 Series, IBM's Security Network "GX" systems, and HP's TippingPoint "NX" devices. Software IPS solutions include Check Point's IPS Software Blade and McAfee's Host Intrusion for Desktop.

-techterms.com

5 0
3 years ago
Other questions:
  • What could prevent earmuffs from providing your ears good protection from noise?
    10·1 answer
  • ____ data exist in a format that does not lend itself to processing that yields information.
    8·1 answer
  • _______ computing refers to applications and services that run on a distributed network using virtualized resources.
    14·1 answer
  • Which of the following statements best compares and contrasts the role of story writers and script writers
    12·1 answer
  • When a workforce scheduling problems is formulated as an integer programming model, it has:?
    6·1 answer
  • Sally thought of adding a new paragraph after the
    6·1 answer
  • Determine if the following identifiers are valid. If they are invalid, state the reason. For example, the identifier min value i
    9·1 answer
  • How does a author develop a character in a story?
    14·2 answers
  • Free Brainliest Again
    14·2 answers
  • 1.How can we be a responsible online user???​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!