1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
11

Write two statements to read in values for my_city followed by my_state. Do not provide a prompt. Assign log_entry with current_

time, my_city, and my_state. Values should be separated by a space. Sample output for given program if my_city is Houston and my_state is Texas: 2014-07-26 02:12:18: Houston Texas Note: Do not write a prompt for the input values. 1 current_time = '2014-07-26 02:12:18:' 2 my_city = "' 3 my_state = "" 4 log_entry - "' 1 test passed 6 print(log_entry) All tests passed Run Run

Computers and Technology
1 answer:
Ainat [17]3 years ago
7 0

Answer:

Here is the program:

current_time = '2014-07-26 02:12:18:'  

my_city = ''

my_state = ''

log_entry = ''

 

my_city = input("")   #reads in value for my_city

my_state = input("")  #reads in value for my_state

log_entry = current_time + ' ' + my_city + ' ' + my_state   #concatenates current_time, my_city and my_state values with ' ' empty space between them

 

print(log_entry)

Explanation:

You can also replace

log_entry = current_time + ' ' + my_city + ' ' + my_state  

with

log_entry = f'{current_time} {my_city} {my_state}'

it uses f-strings to format the strings

If you want to hard code the values for my_city and my_state then you can replace the above

my_city = input("")

my_state = input("")

with

my_city = "Houston"

my_state = "Texas"

but if you want to read these values at the console from user then use the input() method.

The screenshot of the program along with the output is attached.

You might be interested in
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
Given the CIDR IPv4 address block, 200.245.10.0/28, how many subnets are possible and how many hosts can be supported by each su
grin007 [14]

The number of hosts that can be supported by each subnet are option d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork.

<h3>What is a subnet?</h3>

This is also called a subnetwork and it is known to be a form of  a segmented aspect of a bigger network.

Note also that in the above case, the number of hosts that can be supported by each subnet are option d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork.

See options below

a. 228 = 268 subnets, 24 -2 = 14 hosts per subnetwork

b. 24 = 16 subnets, 228 - 2 = 268E6 hosts per subnetwork

c. 24 - 2 = 14 subnets, 24 = 16 hosts per subnetwork

d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork

d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork

Learn more about subnets from

brainly.com/question/8907973

#SPJ1

4 0
2 years ago
Select the correct answer.
mixas84 [53]

Answer:

A. Pixlr

Explanation:

Pixlr is one of the many free options for a graphic design software.  Pixlr is mostly an online editor (used within a browser).  It is also available as an app for both iOS and Android platforms.

Apple Aperture was a commercial product selling for US$300, but has been discontinued in 2013.

Both Adobe products are also pretty expensive.  You can no longer buy them individually, you need to purchase a monthly/yearly subscription.

6 0
3 years ago
Read 2 more answers
would someone be able to actually copy the brain pattern from someone and save it into a computer to create another person?
kkurt [141]

Whole brain emulation (WBE) or mind uploading (sometimes called "mind copying" or "mind transfer") is the hypothetical process of scanning mental state (including long-term memory and "self") of a particular brain substrate and copying it to a computational device, such as a digital, analog, quantum-based or software-based artificial neural network. The computational device could then run a simulation model of the brain information processing, such that it responds in essentially the same way as the original brain (i.e., indistinguishable from the brain for all relevant purposes) and experiences having a conscious mind.[1][2][3]

Mind uploading may potentially be accomplished by either of two methods: Copy-and-Transfer or Gradual Replacement of neurons. In the case of the former method, mind uploading would be achieved by scanning and mapping the salient features of a biological brain, and then by copying, transferring, and storing that information state into a computer system or another computational device. The simulated mind could be within a virtual reality or simulated world, supported by an anatomic 3D body simulation model. Alternatively, the simulated mind could reside in a computer that's inside (or connected to) a (not necessarily humanoid) robot or a biological body.[4]

Among some futurists and within the transhumanist movement, mind uploading is treated as an important proposed life extensiontechnology. Some believe mind uploading is our current best option for preserving who we are as opposed to cryonics.[5] Another aim of mind uploading is to provide a permanent backup to our "mind-file", and a means for functional copies of human minds to survive a global disaster or interstellar space travels. Whole brain emulation is discussed by some futurists as a "logical endpoint"[4]of the topical computational neuroscience and neuroinformatics fields, both about brain simulation for medical research purposes. It is discussed in artificial intelligence research publications as an approach to strong AI. Computer-based intelligence such as an upload could think much faster than a biological human even if it were no more intelligent. A large-scale society of uploads might, according to futurists, give rise to a technological singularity, meaning a sudden time constant decrease in the exponential development of technology.[6] Mind uploading is a central conceptual feature of numerous science fiction novels and films.

Substantial mainstream research in related areas is being conducted in animal brain mapping and simulation, development of fastersuper computers, virtual reality, brain-computer interfaces, connectomics and information extraction from dynamically functioning brains.[7] According to supporters, many of the tools and ideas needed to achieve mind uploading already exist or are currently under active development; however, they will admit that others are, as yet, very speculative, but still in the realm of engineering possibility. Neuroscientist Randal Koene has formed a nonprofit organization called Carbon Copies to promote mind uploading research.


Hope this helps.

3 0
3 years ago
With no options, ____ displays the current listing of bash environment and shell script variables.
Musya8 [376]
The blank is set because it is an abstract data type that can store certain values, without any particular order and no repeated values, so the current listing of the bashful environment is a list or set of values.
7 0
3 years ago
Other questions:
  • Implement the function calcWordFrequencies() that uses a single prompt to read a list of words (separated by spaces). Then, the
    8·1 answer
  • ____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise moni
    6·2 answers
  • )In a vector implementation of a stack ADT, you add an entry to the top of a stack using which vector method?
    13·1 answer
  • Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
    7·1 answer
  • Lets computer know what to do when it starts up...
    9·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    12·1 answer
  • A GPS is an example of a dedicated device true or false
    15·1 answer
  • In python,
    15·1 answer
  • Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces
    10·1 answer
  • You must purchase a network device that supports content filtering and virus defense for your lan. what should you choose?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!