Answer:
The program is as follows:
word = input("Enter a word: ")
if word:
if len(word) <= 4:
word = word[::-1]
else:
word = word[0]+word[1]+word[-2]+word[-1]
print(word)
else:
print('empty!')
Explanation:
This gets input for word from the user
word = input("Enter a word: ")
If input is not empty
if word:
This checks if the length is less than or equal to 4 characters
if len(word) <= 4:
If yes, this reverses the word
word = word[::-1]
If otherwise,
else:
This gets the first, second, second to last two characters
word = word[0]+word[1]+word[-2]+word[-1]
Print the new string
print(word)
Print empty, if input is empty
<em>else:
</em>
<em> print('empty!')</em>
Answer:
The answer is "Option a".
Explanation:
Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.
The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".
Answer: True
Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.
Answer:
b. you need it to do your homework
Explanation:
Answer:
TIGER TEAM
Explanation:
Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.
There are different types of penetration testing teams which are: red team, blue team and purple team.
Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.
In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.
Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.