Answer:
Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?
Explanation:
Answer:
The answer is "DDoS
"
Explanation:
The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.
- This attack is aimed to avoid legal customers of one's website from accessing it.
- In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.
- One other way to successfully attack is to send fake requests from the attacker.
Answer:
describing the structure of an information processing program or another process. Many introductory programming and systems analysis texts introduce this as the most basic structure for describing a process.
Explanation:
- A requirement from the environment (input)
- A computation based on the requirement (process)
- A provision for the environment (output)
Example: A small engineering firm believes there are problems with its hiring process. Several of the junior engineers that have been hired remained at the firm for less than one year. This is a considerable cost to the firm, since recruiting and training new engineers is time consuming and expensive. The human resources manager decides to put together a group of people with extensive experience hiring new engineers. One of their first tasks is to produce an input-output model of the hiring process. They generate the following.
Answer:
14
Explanation: The reason why is because adding a negative is pretty much subtracting by 2. 9-2=7. Then multiply 7 by 2 like add 7 to 7 and you get 14.
Answer:
list1 = [1, 2, 3]
list2 = [4, 5, 6]
list3 = []
newlist = []
for i in list1:
for j in list2:
if list1.index(i) == list2.index(j):
newlist.append(j)
newlist.append(i)
break
for i in reversed(newlist):
list3.append(i)
print(list3)
Explanation:
The programming language used is python.
List 1 and 2 are initialized, and two empty lists are initialized too, these two lists are going to be used in generating the new list.
Two FOR loops are used for both list one and two respectively, to iterate through their content, the IF statement and the break is placed within the for loop to ensure that there is no repetition.
The index of list 1 and list 2 are appended (added) to a new list one at a time.
The new list is then reversed and its content are added to list 3 to give the final solution.
NOTE: The reason a separate list was created was because the reversed() function does not return a list, so in order to get the list, it must be added to an empty list as you reverse it.