Answer:
result 1 = false;
result 2 = true;
Explanation:
result 1 = (43 < -77 && 1! = 10)
43 < -77 = false
1 != 10 = true
for any false && true logical operator, it returns false
result 1 = false;
false = 90 < -77 || -1 < 43
90 < -77 = false
-1 < 43 = true
for any false || true logical operator, it returns true
result 2 = true;
Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
A circuit-switched network would be more appropriate for this application.
<u>Explanation</u>:
The method of Circuit switching helps in the establishment of a network with the nodes that are in communication. The network will be established in the earlier stages before the two nodes starts to communicate with each other. The bandwidth that is essential fro the communication will be reserved and the communication will take place without any interruption.
The example that is given in the question requires a circuit switched network suiting its need. This is because long sessions are essential and there are some needs of bandwidth too. Circuit switched networks helps in this scenario reserving bandwidth for each session of the application and there wont be any wastage. There is also an advantage of ignoring he costs that are related with the setting and disconnecting the circuit connection even if an application has a session with longer time duration.
Answer:
The program to this question as follows:
Program:
def lettersOnly(s): #defining method lettersOnly
val="" #defining string variable that return value
for i in s: #defining loop to calculate value
if(i.isalpha()): #check condition that value is string
val=val+ i #add value
return val #return value
print(lettersOnly("data3base_ro1c3k5s")) #call method and print value
Output:
databaserocks
Explanation:
In the above python code, a method lettersOnly is declared that accepts a string variable "s" in its parameter. Inside the method, a string variable "val", and loop is declared, in which the "val" variable holds method return value.
- In the loop and if block is used that uses "isalpha" string method, which checks the check alphabetic character in the given value. if this is true it will calculate all value in "val" variable and return its value.
- At the last, the print method is used, which calls the lettersOnly method and prints its return value.