Answer:
def sum_cubes(n):
if n == 1:
return 1
else:
return n * n * n + sum_cubes(n-1)
print(sum_cubes(3))
Explanation:
Create a function called sum_cubes that takes one parameter, n
If n is equal to 1, return 1. Otherwise, calculate the cube of n, and add it to the sum_cubes function with parameter n-1
If we want to calculate the cubes of the first 3 numbers:
sum_cubes(3) = 3*3*3 + sum_cubes(2)
sum_cubes(2) = 2*2*2 + sum_cubes(1)
sum_cubes(1) = 1
If you substitute the values from the bottom, you get 27+8+1 = 36
Answer:
Formatting refers to the appearance or presentation of your essay.
Explanation:
Most essays contain at least four different kinds of text: headings, ordinary paragraphs, quotations and bibliographic references.
Answer:
BlueBorne Attack
Explanation:
If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.
Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication
Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.
Answer:
Disruptive Technologies.
Explanation:
Smart Phones and the social media are very power tools they can be used to spread a news like a fire very rapidly.
People mostly believe the new that come on their smartphones and the social media.
So the employees of the company can also be influenced by these technologies hence they can disrupt the work of the company and can make or break the company.
Answer: This can be explained s follows :-
Explanation: The approach in which services available in the network are used by the applications is called service oriented architecture. In such structure a business function is provided by each service that is independent of other services.
Object oriented programming is a programming paradigm. OOP can be used outside of that architecture or it can be apart of SOA as well .