Answer:
Below is the required code:
Explanation:
Python Code
import os
import bin
dir = input("Please specify the location to the directory")
list = os.walk(dir)
a = length(list[1])
b = length(list[2])
print "Files: %n , Sub-dirs : %n" % (b,a)
decision = _(" Do you want to continue? (y/n) "))
if(decision):
cls
else :
exit()
Answer:
Explanation:Systems Analysis
It is a process of collecting and interpreting facts, identifying the problems, and decomposition of a system into its components.
System analysis is conducted for the purpose of studying a system or its parts in order to identify its objectives. It is a problem solving technique that improves the system and ensures that all the components of the system work efficiently to accomplish their purpose.
Systems Design
It is a process of planning a new business system or replacing an existing system by defining its components or modules to satisfy the specific requirements. Before planning, you need to understand the old system thoroughly and determine how computers can best be used in order to operate efficiently.
System Design focuses on how to accomplish the objective of the system.
System Analysis and Design (SAD) mainly focuses on −
Systems
Processes
Technology
When you copy a file to the desktop you are putting the actual file on the desktop whereas when you put a short cut on the desktop you are just placing a reference to where the file is actually located.
The answer is 802.11ac
802.11ac is a type if IEEE 802.11 wireless standards that supports Multiple Input, Multiple Output antennas on sending and receiving data. This type of wireless connection supports 2.4GHz signal or frequency and data speed transfer up to 4.9Gbps. Each device or antenna can run up to 400Mbps each and the maximum device it can handle is up to 8 antennas.
Answer:
Change default username and password.
Explanation:
The corporation under which Derek works has assigned him an assignment of establishing and safeguarding a SOHO router. He intends to ensure that maybe the wireless connection is protected and no further unauthorized person would connect the device to the router. So, the first task is to simply change the username and password that the wifi routers will be secured.
So, the following answer is correct about the given scenario.