1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
6

Write a method called multiconcat that takes a string and an integer as parameters. return a string that consists of the string

parameter concatenated with itself count times, where count is the integer parameter. for example, if the parameter values are "hi" and 4, the return value is "hihihihi". return the original string if the integer parameter is less than 2
Computers and Technology
1 answer:
iren2701 [21]3 years ago
6 0
Def multiconcat( string, number ):
    retString = ""
    for i in range( number ):
        retString += string
    return( retString )
You might be interested in
How do you navigate multiple computer screen at one time?
meriva
Use team vewer its made for that kinda stuff
6 0
3 years ago
Ive already tried "word" and "star"
ale4655 [162]

Could use a hint or search  for four letter words

Hope it helped

6 0
3 years ago
When you start to type =av, what feature displays a list of functions and defined names?
MAXImum [283]
The feature displays a list of functions and defined name, but after you start to type = av and it will begin typing an formula. Formula AutoComplete is the defined name will come up in the screen. Formula AutoComplete is also called the word completion it is a feature that predicts the remaining part of the word a user is typing.
3 0
4 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
Other questions:
  • Who will win the premier league
    9·2 answers
  • Derek has an interest in designing video games. What requirements should he fulfill to be a game designer?
    13·1 answer
  • Explain the difference between the term graphic communication and printing
    7·1 answer
  • 30 points!! What should I do if I plug my computer in and it starts making noises and sounds and it starts smelling.
    9·1 answer
  • Which module is missing from most expert systems? a. Knowledge base subsystem b. Inference engine c. User interface subsystem d.
    5·1 answer
  • Explain the four misconceptions about entrepreneurship.
    7·1 answer
  • Hubs connect network hosts in which configuration?
    7·1 answer
  • I just need question 2 answered. Someone please help I’m on a test!
    10·1 answer
  • Read two numbers from user input. Then, print the sum of those numbers.
    11·1 answer
  • Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!