It's easy you need to use function for decimal in binary.
binary STD;
int STD_no;
STD=STD_No.ToBinary
Answer:
Check the explanation
Explanation:
Here in this game of Tic-Tac-Toe, it is using the TPGE engine which is a Tiny Python Game Engine. Let's talk about its functions like:-
def image_type(img): In this function, it is simply taking image as a parameter and returning its object type like DISC if the image is in graphical form, TEXT if it is a string, and LINE if it is other than the mentioned object.
def convert_image(img): In this function, it is simply taking image as a parameter and returning an equivalent graphical object as understood by John Zelle's. Mainly comparing for three things in this function and those are: if image equals to DISC then it is calling convert_circle(function), if image equals to LINE then it is calling convert_line(function), and if image equals to TEXT then it is calling convert_text(function),
def convert_circle(x): This function takes a list( a group of values) and makes a circle at the center of the window and the circle's radius is coming from the list.
convert_text, convert_line, convert_circle are only creating text, line, and circle and then returning it.
def graphical_elements(images): This function is taking image as a parameter and then extracting shape and color from the image and then calling convert_image(shape) and convert_type(shape) and it gives us graphic and kind respectively. Now it is checking whether kind equals to DISC If yes then filling color on the window else, setting the outline of the window
def run(): Here it is finally running the game with required parameters, the whole game is continously running under the while loop.
That's all
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).
<span>I'm pretty sure that the answer is: The default view in word is print layout view, which shows the document on a mock sheet of paper in the document window.</span>
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.