1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
13

The function below takes one parameter: a list of strings (string_list). Complete the function to return a new list containing o

nly the strings from the original list that are less than 20 characters long. For this question, you'll first want to create an empty list. Then, you'll want to visit every element of the original list checking to see if it is short. You'll append the short strings to your new list. Finally, return the new list.
Computers and Technology
1 answer:
Radda [10]3 years ago
4 0

Answer:

def short_strings(string_list):

   short_list = []

   for s in string_list:

       if len(s) < 20:

           short_list.append(s)

   return short_list

Explanation:

* The code is in Python.

- Create a function called short_strings that takes one parameter, string_list

- Create an empty list called short_list to hold the strings that are less than 20 characters

- Initialize a for loop that iterates through the string_list. Check if there are strings that are less 20 characters in the string_list. If found, put them in the short_list

- Return the short_list

You might be interested in
Examples of pop in computer​
marishachu [46]

Answer:

Short for Post Office Protocol, POP or POP mail is one of the most commonly used protocols used to receive e-mail on many e-mail clients. There are two different versions of POP: POP2 and POP3. POP2was an early standard of POP that was only capable of receiving e-mail and required SMTP to send e-mail. POP3 is the latest standard and can send and receive e-mail only using POP, but can also be used to receive e-mail and then use SMTP to send e-mail.

3 0
2 years ago
You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
kumpel [21]

Answer:

The answer is by using a covert channel like shared memory objects such as files, directories,messages, etc since both  the user and the sender of the document are on same network of the company.

Explanation:

The Bell LaPadula MultiLevel Security model was a security policy developed by Bell and LaPadula in 1973 in response to a security issue raised by the US Air Force regarding file-sharing mainframe computers . Actually, many people with networked systems have realized by early 1970s that the protection purportedly offered by many commercial operating systems was poor, and wa not getting better any time soon. This was observed when it was noticed that as one operating system error was fixed, some other vulnerability would be discovered. There was also the constant worry that various unskilled users would discover loopholes in the operating system during usage and use them to their own advantage.

 Information release may take place via shared memory objects such as files, directories, messages, and so on. Thus, a Trojan Horse acting on behalf of a user could release user-private information using legitimate operating system requests. Although developers can build various mechanisms within an operating system to restrict the activity of programs (and Trojan Horses) operating on behalf of a user  , there is no general way, short of implementing nondiscretionary policy models, to restrict the activity of such programs. Thus, given that discretionary models cannot prevent the release of sensitive information through legitimate program activity, it is not meaningful to consider how these programs might release information illicitly by using covert channels.

For example, for someone with higher integrity level (SECRET) to send an accounts payable application to a user, if the untrusted accounts payable application contains a Trojan Horse, the Trojan Horse program could send a (legal) message to the said user process running at a lower integrity level (CONFIDENTIAL), thereby initiating the use of a covert channel. In this covert channel, the Trojan Horse is the receiver of (illegal) lower integrity-level input and the user process is the sender of this input.

7 0
3 years ago
A ___ is a node (or a device) that connects two different networks together and allows them to communicate.
stellarik [79]

Answer:

The answer is Hub

Explanation:

A hub, also called a network hub, is a common connection point for devices in a network. Hubs are devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

7 0
2 years ago
Which two computer peripherals are connected to the computer through a port?
chubhunter [2.5K]
Most computer devices are connected to the computer through port
Keyboard through usb port
Printer through usb port
Hand point device through usb port
Also computer equipped with LPT port for printers and COM port for additional devices like external modems e.t.c
7 0
3 years ago
How many fixes are available for Adobe Photoshop CS4 (64 Bit)?
arsen [322]

Answer:

There are three (3) fixes in adobe cs4.

Explanation:

Adobe photoshop cs4 is a version of the creative cloud's professional graphic applications used to edit pictures, design interfaces, make graphical illustrations, draw and animate the drawings, etc.

It can be installed in several computer operating system platforms like linux, mac and windows. The adobe photoshop cs4 doesn't support the windows installation and might run into several issues. There are other issues in other supported platforms, but unlike for windows, there are three fixes for these problems.

4 0
3 years ago
Other questions:
  • If you were optimizing for performance and wanted to support potentially adding many new elements to an adt, then:
    12·1 answer
  • An _________ is a phrase formed from the first letters of words in a set phrase or series of words a. Acronymic sentence c. Basi
    7·2 answers
  • ABC software company is to develop software for effective counseling for allotment of engineering seats for students with high s
    13·1 answer
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • Technician A says that to cover all possible vehicle conditions, coolant must have a high freezing point. Technician B says cool
    6·2 answers
  • Which describes the first step a crawler-based search engine uses to find information?
    10·2 answers
  • To protect a computer, it is a good idea to install and frequently run
    6·2 answers
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
  • Select the correct answer
    15·1 answer
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!