lst = short_names.split()
print(sorted(lst,reverse = True))
Omg I would die to have your points because when I get on people call me a noob because I just got the app like 3 days ago and every time I answer a question some says noob like dang I just started
Answer:
c. All of these choices are correct
Explanation:
XBRL (eXtensible Business Reporting Language) is a freely available and global framework for exchanging business information which uses XML-based data tags to describe financial statements for both public and private companies. It is a normalized version of XML. It leverages efficiencies of the Internet as today’s primary source of financial information by making Web browser searches more accurate and relevant.
Therefore, options a, b and d can be identified in the above definition of XBRL. Therefore,all the choices are correct.
Answer:
Entity is any object in the system and that we want to model and store information
eg Lecture , students and Employee
Explanation:
Entity
Entity is any object in the system and that we want to model and store information.
and Entities is usually recognizable concept in which either abstract or concrete
like event , person things and place etc
and that is relevance to database
some common example are :
Lecture , students and Employee
Answer and Explanation:
The requirements to be considered while determining the firewalls' features and locations are:
- The reason so as to why to implement a firewall
- Traffic inspection type required to be accomplished.
- Best OS, i.e., Operating System suitable for the work need.
- The method to fir firewall into the topology (network).
- Making decision whether the firm is more suitable for software solution or application.
Some of the importants steps to be taken for the firewalls to remain effective:-
-
Use of strong password.
- according to the usage, tweak the settings of the firewall.
- Enable auto update for firewall.
- Maintain consistency in settings throughout the network.
- addition of multiple layers to the security and computer system.
- Application of encryption (128 bit WEP).
- Analysis of the traffic both outbound and inbound and taking appropriate measures.
- Always check for leaks and ports.