1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
8

Write a program for TIC TAC TOE in PYTHON

Computers and Technology
1 answer:
masya89 [10]3 years ago
3 0

Answer: much too long to write here: see attached

Explanation:

You might be interested in
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
What type of user account should Tuan’s brother use?
Sauron [17]

Answer:

d so if he comes back any time soon

Explanation:

6 0
4 years ago
after installing a second hard drive what needs to be done to the hard drive and what do these 2 tasks do?
PIT_PIT [208]
To make it useable, the disk first needs to be subdivided into logical volumes, then formate, so that it is readable by the systems.
6 0
3 years ago
What steps can be used to password-protect a worksheet?
muminat

Answer:

Review

Changes

Protect sheet

Explanation:

I did it

8 0
3 years ago
Is anyone excited for the new matrix coming out ?
Vinil7 [7]

Answer:

Yes, me!!

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Consider the attack scenario given below:
    8·1 answer
  • Two different names that refer to the same data item best defines:
    12·1 answer
  • Casey, a woodworker, is developing his own website. He plans to use the site as a means of selling his handmade furniture. While
    10·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • Write a program that echos back any inputted integer greater than 1, and exits when a 0 is entered. Your program should use a co
    11·1 answer
  • Write the code to replace only the first two occurrences of the word second by a new word in a sentence. Your code should not ex
    15·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • Why might a company choose Linux for its operating system instead of Microsoft Windows or Mac OS? The company's employees can sy
    13·1 answer
  • What is a characteristic of high-level languages?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!