Answer: what? do you need any help, bc I can help with any question you have
Explanation:
Answer:
backup() {
read dirname;
if [[ whereis . /`$dirname` 2> sterr.exe]]
then
mkdir $dirname
for f in . / *.cpp
do
cp f "path_to_dirname"
echo "file backup complete"
}
backup( )
Explanation:
The bash script above is used to backup C++ source files in a directory to a backup directory which is created if it does not exist, and copy's each .cpp file to backup, then sends a message to declare its completion.
Answer:
see explaination
Explanation:
The following code is in python 3.5 and above:
# Create a main method
def main():
# Accept name from the user
name = input("Enter your name: ")
# Accept describe yourself from the user.
describe = input("Describe yourself: ")
# Create a file object
f = open('person.html','w')
# Creat a string to store the html script.
message = """<html>
<head>
</head>
<body>
<center>
<h1>"""+name+"""</h1>
</center>
<hr/>"""+describe+"""<hr/>
</body>
</html>"""
f.write(message)
f.close()
main()
Answer: 3) Information extortion
Explanation:
Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.
- Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
- Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
- Thus, the correct option is option(3).