Answer:
to compose letters and memos
to create charts and graphs from a table of
values
to deliver a sales presentation to clients
Explanation:
I forget what the reasoning behind them but I know this is the answer
Answer:
The program in Python is as follows:
firstName = []
lastName = []
while True:
fName = input("First Name: ")
lName = input("Last Name: (Enter to quit): ")
if not lName:
break
firstName.append(fName)
lastName.append(lName)
for i in range(len(firstName)):
print(firstName[i] . lower()+"."+lastName[i] . lower()+" mycollege . edu")
Explanation:
See attachment for complete source file where comments are used as explanation
Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.