1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
13

3.7 Code Practice For this lesson, you will come up with your own challenging algorithm for other students to trace. It must con

tain at least 5 if statements and use at least one AND or OR boolean condition.
Note: Elif or else statements will not count - your statements must be if statements. Each if statement should use a unique variable name.
Computers and Technology
1 answer:
Elanso [62]3 years ago
8 0

var1 = False

var2 = False

var3 = False

var4 = False

var5 = False

if not var1:

   var3 = True

if not var1 and var3:

   var1 = True

   var2 = True

   var3 = False

if not var1 or not var3 and var2:

   var4 = True

if var4 and var1:

   var5 = True

if var5 or not var1:

   var3 = False

I decided to use variables of type boolean. I hope this helps!

You might be interested in
Why is my speedtest is very good but chrome is slow
olga55 [171]
Maybe you have lots of tabs open
5 0
3 years ago
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Who is the primary audience for demonstrations of game prototypes made by the developer?
padilas [110]

Answer:

the tester

Explanation:

When a video game is playable the first audience to test these prototypes are the tester, these people have to test all the game, and they have say all the information about errors, issues, bugs, and any difficulty to resolve these problems in a final video game's version, in this way the complete game arrives to the final audience.

5 0
3 years ago
What software that allow for one-click performance profiles for msi video card??
vovangra [49]
<span>The MSI Gaming App allows for a one-click performance for profiles that unlock extra performance for gaming or to keep your card silent during light use.</span>
8 0
3 years ago
What are the major functions of a computer
murzikaleks [220]
A computer is a device whose main function is to process large amounts of information quickly and accurately, and this procedure is done thanks to hardware and software.
7 0
4 years ago
Other questions:
  • Which of the following is a list of input devices?
    13·2 answers
  • If you are unsure about what is or isn’t appropriate to wear to a new job, what is the best thing to do?
    13·2 answers
  • There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
    13·1 answer
  • How can our perceptions help us to choose the channel for our message?
    5·1 answer
  • A relative path name defines a path from_________________________ Select one: a. from the UFD (user file directory) b. the curre
    6·1 answer
  • What should you remember when using the thesaurus to replace words?
    8·2 answers
  • Using python:
    10·1 answer
  • Integer indexing array: Weekend box office The row array movieBoxOffice stores the amount of money a movie makes (in millions of
    11·1 answer
  • Explain the purpose of QoS on a TCP/IP network. Define the basic purpose of IP prece- dence, Type of Service, Diffserv, and Expl
    11·1 answer
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!