Answer:
Following are the code to this question:
l= []#defining an empty list
n=int(input("Enter total element you want to insert: "))#defining variable to input total element
for i in range(0,n):# defining loop to input value in list
insert=int(input())#defining variable insert to input value
l.append(insert) # adding the elemenents into the list
x=n//2#calculating midpoint
l1 =l[:x]#using slicing to hold first-half value in l1 list
l2 =l[x:]#using slicing to hold second-half value in l2 list
print("Before interchange: ")#print message
print ("list : ",l)#print input list
l3=l2 + l1#add value in l3
print("After interchange: ")#print message
#print(l3) #print list l3
print (str(l3)[1:-1])#print list l3
Output:
please find the attachment.
Explanation:
Description of the code:
- In the above python program, an empty list l is declared, in the next line, variable n is defined, that input the total number of the list elements. In the next line, the for loop is declared, which uses the insert variable input value and used the append method to add value in the list.
- In the next step, the variable x is declared, which finds the midpoint of the list, and defines the l1 and l2 lists, that use slicing to hold the first and second half values.
- In the last step, the l3 list is declared, that adds the l1 and l2 lists and use the print method to print its values.
Answer:
The type of attack is <em>Phising Email.</em>
<em />
Explanation:
Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.
Answer:
Verbatim Identifier
Explanation:
- Verbatim Identifier contains @ symbol as a prefix by which enables you to use reserved words of a programming language as identifier. For example the keywords like int, double, goto, char, else, while, for, float etc can be used as strings or variable names if @ symbol is added before these words e.g. @char, @while, @void, @int etc.
- The compiler of a language will recognize such identifiers as verbatim identifiers and compiles them without giving an error that these are reserved words.
- Verbatim identifier is used for program that is written in other languages and those languages don't have same reserved words.
- For example: cout<<"use of verbatim identifier";<<@for; In this statement, for keyword which is used in for loop can be used as an identifier with @ in the prefix.
- The escape sequences if used with @ symbol in prefix then they are interpreted in a different way. For example in C#
string a = "\\C:\torrent\new\file";
Console.WriteLine(a);
This statement will give the following output:
\C: orrent
ewfile
This means that the \t in the start of torrent and \n in the start of new word is taken as an escape sequence and output displayed is giving tab space because of \t and prints the rest of the words in new line because of \n escape sequence.
Now lets use this with the @ symbol
string a = @"\\C:\torrent\new\file";
Console.WriteLine(a);
The output will now be:
\\C:\torrent\new\file
\t and \n are not taken as escape sequences by the compiler because of @ symbol.
If you originally had a tracking device installed on a different device like find my iPhone, you can easily see where it is. If your phone is Android, Google has a system where you can search where's my phone, and if you have your email login into your phone, you can log in on Google and Google will show you where it is.
Answer:
Subtraction
Explanation:
That is subtracting the values of two cells.
You know because of the "-" sign