1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
9

Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod

e where the questions marks are to finish the code. numl - int (input()) num2 = ? print(numl + ?) Note: Our system automatically runs your program several times, trying different input values each time to ensure your program works for any values. Notes on how to solve this. See How to Use zyBooks for info on how our automated program grader works istof Helpl....docx Essay 1 (1).docx Team Cut
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
8 0

Answer:

The full program is:

<em>num1 = int(input()) </em>

<em>num2 = int(input()) </em>

<em>print(num1 + num2)</em>

<em />

Explanation:

Given

<em>num1 = int(input()) </em>

<em>num2 = ?</em>

<em>print(num1 + ?)</em>

<em />

Required

Replace ? with the right codes

Line 1: The syntax is correct

Line 2: The ? should be replaced with an integer input function to get input for num2.

So, the second line would be: <em>num2 = int(input()) </em>

Line 3: The ? should be replaced with num2 in order to calculate and print the required sum.

So, the third line would be: <em>print(num1 + num2)</em>

<em />

You might be interested in
Can someone who is good at 9th class IT (cbsce) can help me in my homework​
postnew [5]

Answer: yeah

Explanation:

4 0
3 years ago
What is web based<br> What is local <br> What is mobile in computer
Radda [10]

Answer:

The mobile web refers to browser-based World Wide Web services accessed from handheld mobile devices, such as smartphones or feature phones, or a device. hope this helps :)

Explanation:

6 0
3 years ago
Main function of Ubuntu
Lynna [10]

Answer:

Ubuntu includes thousands of pieces of software, starting with the Linux kernel version 5.4 and GNOME 3.28, and covering every standard desktop application from word processing and spreadsheet applications to internet access applications, web server software, email software, programming languages and tools

Explanation:

5 0
3 years ago
Read 2 more answers
The Flow of Control refers to the order in which statements are executed. TRUE FALSE
sesenic [268]

Answer:

TRUE

Explanation:

The Flow of Control refers to the order in which the statements are executed.

One can understand the code if he knows the flow of control.

4 0
3 years ago
Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security
a_sh-v [17]

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

<h3>How to explain the information?</h3>

Authentication works as follows:  

  • Prompting the user to enter the credentials.  
  • Send credentials to the authentication server.  
  • Match the credentials.  
  • Authorize the user and grants the acces

<u>External Website security:  </u>

  • Use of firewall.  
  • Implement the access control.  
  • Use of MVC (Model View Controller)
  • Use of encryption.  
  • Use of SSL certificate.
  • Use of security plugins.  
  • Use of network monitoring team.  

<u>Internal Website security:  </u>

  • Use of authentication to identify the user identity.  
  • Use of authorization to provide different user with the specific privileges and access.  
  • Encrypt or hide sensitive web pages.  
  • By implementing IT policies.  
  • Educate the user about the website.  

<u>Remote Access Solution</u>:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

<u>Firewall and Basic rules recommendations</u>:  

  • Firewall is important for managing the traffic and providing external website security.  
  • Rules to prevent SQL injection and XSS.  
  • Allow only the specific type of traffic.  
  • Use access rules for IP security.  
  • Implement certain IT policies.  

<u>Wireless Security:  </u>

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

<u>VLAN configuration:  </u>

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

<u>Laptop Security Configuration:  </u>

Use of password, VPN and the registering the laptop will provide laptop security. .  

<u>Application policy recommendations</u>:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

<u>Security and privacy policy recommendations:  </u>

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

<u>Intrusion detection or prevention for systems containing customer data:  </u>

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

brainly.com/question/5939963

#SPJ1

7 0
1 year ago
Other questions:
  • The prepaid tuition plan covers
    9·2 answers
  • Briefly describe the client/server model.
    8·1 answer
  • Which option in presentation software can you use to apply a “fly in” effect to the objects on a slide? A)flowchart B)shapes C)
    11·2 answers
  • The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understandA.
    11·1 answer
  • Carbon monoxide poisoning can result from breathing
    15·1 answer
  • The power relationship on a transformer states that O Power in = power out + loss O Power in = 1/2 power out (Power in = 2 x pow
    5·1 answer
  • The Yuba College Library would like a program to calculate patron fines for overdue books. Fines are determined as follows: Pape
    15·1 answer
  • With working from home now becoming a norm what is an effective network for an organization to secure its internal resources acc
    14·1 answer
  • Rewrite the code below so that a transformation moves the div 100px to the right and 50px upward.
    5·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!