Answer:
import csv
with open('employee_birthday.txt') as csv_file:
csv_reader = csv.reader(csv_file, delimiter=',')
line_count = 0
for row in csv_reader:
if line_count == 0:
print(f'Column names are {", ".join(row)}')
line_count += 1
else:
print(f'\t{row[0]} works in the {row[1]} department, and was born in {row[2]}.')
line_count += 1
print(f'Processed {line_count} lines.')
Explanation:
Heres an example of how to read csvs
Answer:
Using a one time password OTP and using a three factor authentication.
Explanation:
Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.
Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.
One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.
Answer:
Option (A) is the correct answer of this question.
Explanation:
The server supports the processing requests from the remote computers. A system is a device built to accommodate inquiries from many other external systems and customers to execute transactions. Employees are called private computer ,tablets, including phones which connect websites.
Network resources are handled through servers.The server is a software application or tool providing a service to some other software program and its customer, also identified as those of the user.
Other options are incorrect because they are not related to the given scenario.
Answer:
"cost, schedule, technical, and organizational feasibility schedule" is the correct option.
Explanation:
A technical feasibility is the study of the concerned about the specifying software and tools which satisfy the users' need. It is also the process of thinking for which business technologies are important to bring labours, transportation, and materials.
An organizational feasibility is the study of the information of the professional background and about the skills which are necessary for the contribution in the business.
Arturo is attempting to protect the database (data) of an information system (IS).
<h3>What is an information system?</h3>
An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.
In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:
Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.
This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.
In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).
Read more on data here: brainly.com/question/25885448