* Main Electron a component- vacuum tube.
* Main memory- Magnetic drums and magnetic tapes.
* Programming language- Machine language.
* Power- Consume a lot of electricity and generate a lot of heat.
* were expensive to operate
Answer:
The TAB key
Explanation:
Sam would use the TAB key, located on the left side of the keyboard, to move around his document to add stops and format its information properly.
Pressing the TAB key will introduce a tab code in his document, which is like moving ahead by a certain number of spaces (5,6, 10 spaces for example, depending on the configuration of the document), but without using spaces, using a tab which is a much better option to position, align things up.
Answer:
\n
Explanation:
readline() method is used to read one line from a file. It returns that line from the file.
This line from the file is returned as a string. This string contains a \n at the end which is called a new line character.
So the readline method reads text until an end of line symbol is encountered, and this end of line character is represented by \n.
For example if the file "abc.txt" contains the lines:
Welcome to abc file.
This file is for demonstrating how read line works.
Consider the following code:
f = open("abc.txt", "r") #opens the file in read mode
print(f.readline()) # read one line from file and displays it
The output is:
Welcome to abc file.
The readline() method reads one line and the print method displays that line.
Answer:
D. Identify the problem.
Explanation:
There are six steps or stages in computer system troubleshooting. They are,
1. Identify the problem: In the stage of troubleshooting, the user is interviewed to get a description of the problem. Reproducing the problem is essential to confirm the described problem of the system before moving to the next stage.
2. Establish a theory of probable cause: when the problem is identified, a list of the possible cause of the problem is made.
3. Test the theory to determine a cause: each items on the list of possible cause of the problem is tested to confirm its actual cause.
4. Resolve the problem.
5. Verify full system functionality
6. Document the findings, actions and outcomes.
Answer:
Zero-day exploits
Explanation:
Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.
When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.