Answer:
Explanation:
Using Python programming language
Explanation: 
1. I defined a function add and passed in two parameters (a,b).
2. In the block of the function, I added the two numbers and printed the result. 
3. I decided to use a function so that the program is re-usable and can accept various inputs. 
Find the code below. (# are used for comments)
#Addition of numbers
def add(a,b):
    print(a+b)
#Test Cases
add(2,4.5)      #Result=6.5
add(10,290)     #Result=300
add(2.567,4.58) #Result=7.147
 
        
             
        
        
        
Answer:
biometrics 
Explanation:
Voice and fingerprint <u>biometrics</u> can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.
 
        
             
        
        
        
Answer:
200Ω
Explanation:
In series circuits, you add the resistances.
 
        
             
        
        
        
Answer:
In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.
 
        
             
        
        
        
Because there fun and helps boys get together or to get ur mind off of stuff