Answer:
Written in Python
name = input("Name: ")
wageHours = int(input("Hours: "))
regPay = float(input("Wages: "))
if wageHours >= 60:
->total = (wageHours - 60) * 2 * regPay + 20 * 1.5 * regPay + regPay * 40
else:
->total = wageHours * regPay
print(name)
print(wageHours)
print(regPay)
print(total)
Explanation:
The program is self-explanatory.
However,
On line 4, the program checks if wageHours is greater than 60.
If yes, the corresponding wage is calculated.
On line 6, if workHours is not up to 60, the total wages is calculated by multiplying workHours by regPay, since there's no provision for how to calculate total wages for hours less than 60
The required details is printed afterwards
Note that -> represents indentation
Your answer would be C. Internet since we all use the internet everyday to communicate through all over the world. We can currently communicate to the other side of the world with little to no effort now, almost 10 years ago it would of been very difficult.
Answer:
Follows are the solution to this question:
Explanation:
The process ID is not static because this can't be used to identity, therefore, it includes excellent service providers like HTTP since it is allocated dynamically only to process whenever a process is initiated.
Sometimes its instance connectors are managed on numerous TSAPs. This can be implemented unless the process ID is being used as each procedure could have an identity.
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Answer:
processor speed is the answer but not sure