1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
3 years ago
5

True or False: To create a function in python, you start with the keyword "def"

Computers and Technology
2 answers:
Butoxors [25]3 years ago
8 0

Answer:

true i think

Explanation:

Katyanochek1 [597]3 years ago
6 0

Answer:

true

Explanation:

i saw the other answer and wanted to contribute to your knowledge

You might be interested in
An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and
Readme [11.4K]

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

7 0
3 years ago
You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1
bija089 [108]

Answer:

The correct solution will be "Get-Package".

Explanation:

  • The accreditation property defines a domain as well as client initials with computer authorizations for executing commands. Mostly on the virtual device, the argument ScriptBlock executes the Get-Package cmdlet.
  • This order obtains from some kind of special introductory commercial software downloaded on either the user's computer.
5 0
3 years ago
Compute the bitwise XOR between 10010100 and 11101010.
Contact [7]

Answer:

The resultants bits for two strings are 0111 1110

Explanation:

Given details:

two pair of strings are

10010100

11101010

comparing two pair of strings, then perform XOR operation

Rules to follow for XOR

If both the bits are same then resultant is zero 0 and if bits are different resultant is one

XOR operation:

10010100

11 1 01010

-------------

01111110

The resultants bits for two strings are 0111 1110

8 0
3 years ago
A desktop computer (named workstation22) can’t connect to the network. A network card was purchased without documentation or dri
Lelechka [254]

Answer:

<em>The first step is to download the driver file from the Internet using  another Computer system, Copy the driver to a flash or CD then run the installation file on the Desktop Computer.</em>

Explanation:

<em>Driver files can be easily gotten from software sites online or from other secure websites, most times you have to pay for these driver files in some sites for secure and authentic download.</em>

<em>it is very necessary  that the user takes note of the exact system name, model and system architecture with respect to when downloading the driver file.</em>

4 0
3 years ago
9.11: Array Expander
vodka [1.7K]

The Array Expander is an illustration of arrays and functions.

  • Arrays are variables that stores multiple values
  • Functions are named statements that are executed when called

<h3>The Array Expander program </h3>

The Array Expander program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

//This declares the Array Expander function

int* ArrayExpander(int *oldArr, int size){

   //This declares the new array

   int *newArr = new int[size * 2];

//This iteration sets values into the new array

   for (int i = 0; i < size * 2; i++) {

       if(i < size){

           *(newArr+i) = *(oldArr+i);

       }

       else{

           *(newArr+i) = 0;

       }

   }

//This returns a pointer to the new array

   return newArr;

}

//The main method begins here

int main(){

//This declares the length of the array, N

   int N;    

//This gets input for N

   cin>>N;

   int initArr[N];

//If N is between 1 and 50

   if(N > 0 && N <=50){

//This iteration gets values for the array

       for(int i = 0; i<N; i++){

           cin>>initArr[i];

       }

//This calls the Array Expander function

   int *ptr = ArrayExpander(initArr, N);

//This iteration prints the elements of the new array

   for (int i = 0; i < N*2; i++) {

       cout << ptr[i] << " ";

   }

   }

  return 0;

}

Read more abou C++ programs at:

brainly.com/question/27246607

3 0
2 years ago
Other questions:
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • What type of attack intercepts communication between parties to steal or manipulate the data?
    13·1 answer
  • IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive d
    7·1 answer
  • Jennifer recently bought a new computer to type a new manuscript she’s been working on. She also stored a lot of movies on it to
    10·1 answer
  • Which type of market are you in if your firm, along with three other firms, controls 95% of the total music industry?
    13·1 answer
  • Ujqwgydft frrhyy4e uvbw vhrwbhv vbyrewblv?
    14·1 answer
  • What is one effective way for employees to keep their skillsets current?
    8·2 answers
  • WILL MARK CORRECT ANSWER AS BRAINLIEST PLSSSS HELP!
    13·2 answers
  • Define artificial intelligence?​
    15·2 answers
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!