Answer:
Following are the code to this question can be described as follows:
c= input('Input triangle_char: ') #defining variable c that input character value
length = int(input('Enter triangle_height: ')) # Enter total height of triangle
for i in range(length): # loop for column values
for j in range(i+1): #loop to print row values
print(c,end=' ') #print value
print()# for new line
Output:
please find the attachment.
Explanation:
In the above python code, two variable "c and length" variables are declared, in variable c is used to input char variable value, in the next line, length variable is defined, that accepts total height from the user.
- In the next line, two for loop is declared, it uses as nested looping, in which the outer loop prints column values and inner the loop is used to prints rows.
- To prints all the value the print method is used, which prints the user input character triangle.
A program that repeatedly prompts a user for integer numbers :
biggest = none
smallest = none
while True:
input = raw_input(“Enter a number:”)
if(input == “done” break
try:
number = float(inp)
except ValueError:
print “Please enter only numbers”
else
if smallest is None:
smallest = number;
biggest = number;
elif number < smallest:
smallest = number
elif num > largest:
largest = number
Print “Greatest is “, biggest
Print “Smallest is”, smallest
In this program an input is obtained, if it is equal to the word “done”, then the program stops b printing greatest and smallest number in the given input.
If invalid inputs are given then user is prompted to enter valid number. Otherwise the value of smallest and greatest are calculated according to the input using if-else construct.
Answer:
It is called a WPS brutal force attack.
Explanation:
Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).
WPS is used to connect to a network without passphrase, but with a key combination or a PIN.
Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.
Answer: "N" is considered as the size of the input that is being given in the algorithm.
Explanation: During a problem solving process , a algorithm is used to analyze the problem . Many function and steps are to be taken care of while analyzing algorithm. Among analyzing step, input is also given which is usually zero more than that . An input has a certain size which is given by the initial "N". The input size defines the length of the string for the input.