1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
7

What does XML do with a data wrapped in the tags?

Computers and Technology
1 answer:
Arlecino [84]3 years ago
5 0

Answer:

Especificación para diseñar lenguajes de marcado, que permite definir etiquetas personalizadas para descripción y organización de datos. ¿Para que sirve XML? Representar información estructurada en la web (todos documentos), de modo ... Las etiquetas se definen para crear los documentos, no tienen un significado

Explanation:

You might be interested in
Your organization wants to implement a 5-year rotation plan for all of its computing devices. What percentage of the computer fl
sashaice [31]

Answer:

20

Explanation:

C the answer is 20

7 0
3 years ago
Read 2 more answers
Def build_dictionary(string):
MissTica

Answer:

Follows are the code to this question:

def build_word_counter(string):#defining a method build_word_counter that accepts string as a parameter  

   d = dict()#defining d variable as a dictionary

   for x in string:#defining for loop that use string

       x = x.lower()#Use lower method  

       if not d.get(x):#defining if block that holds value in d variable

           d[x] = 1#use dictionary to hold value in 1

       else:#defining else block

           d[x] += 1#use dictionary to increment value by 1

   return d#return dictionary

print(build_word_counter(["Like","like","LIKE"]))#use print method to call method

def build_letter_distribution(string):#defining a method build_letter_distribution that accepts string variable

   d = dict()#defining d variable as a dictionary

   for i in string:#defining for loop to count string value

       for j in i:#defining for loop to hold string as number

           if not d.get(j):#defining if block that doesn't get value in dictionary  

               d[j] = 1#hold value in dictionary  

           else:#defining else block

               d[j] += 1#use dictionary to increment the dictionary value

   return d#return dictionary

print(build_letter_distribution(["Like","test","abcdEFG"]))#use print method to return its value

Output:

please find the attached file.

Explanation:

In the first program a method, "build_word_counter" is defined that accepts a string variable in its parameter, and inside the method, a dictionary variable "d" is defined that uses the for loop to hold string value and convert all value into lower case.

In the next step, a conditional statement is used that holds value in the dictionary and count its word value.

In the second program a method, "build_letter_distribution" is defined that holds string variable in its parameter, and inside the method, a dictionary variable "d" is defined that uses the two for loop and in if the block, it holds value in the dictionary and returns its value, and use print method to print its return its value.

4 0
3 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
What technology will I use when I become a surgical technologist?
otez555 [7]

Explanation:

Preoperative: Sterile Hands

The surgical technologist is the first person to enter the OR before surgery. During this preoperative phase the surgical technologist adheres closely to the following routine:

Carefully dons his or her operating room attire, including scrubs

Begins to prepare and sterilize the room

Gathers all of the equipment and surgical tools that the surgery requires

Sterilizes, counts and carefully arranges them

The most important part of this preoperative phase is creating and maintaining the OR’s sterile environment. Sterile fields can be compromised in a variety of ways, the most common of which is by introducing moisture. To prevent this, the surgical technologist is responsible for arranging dry drapes around the operating table and keeping all surfaces in a sterile condition.

Intraoperative: The Third Hand

During the intraoperative phase of the surgery, surgical technologists are still responsible for maintaining the sterility of the OR, but they also effectively become a “third hand” to the surgeon and surgeon’s assistant during the procedure and perform the following tasks:

Help prepare medications and administer them to the patient

Assist in retracting tissues from the patient

Passes the surgical tools to the surgeon and surgical assistant during the operation

At any time during an operation, if a tool is missing or contaminated, the delay or resulting infection could cost a patient his or her life. That is why surgical technologists must be diligent and thorough at all times.

Postoperative: Tying Things Up

As the operation concludes, surgical techs are responsible for the following:

Counting all of the tools and instruments used during surgery to ensure that nothing is left behind in a patient

Suture the incision and apply disinfected dressings to the area

Dispose of items such as needles and gauze, and continue to maintain the OR’s sterile environment until the patient is sent to the recovery ward

Thinking-On-Your-Feet: Cell Phones in the OR

While surgical techs aren’t expected to work miracles, they must be able to think quickly on their feet in emergency situations. During a recent hospital blackout and emergency generator failure, one quick-thinking surgical tech, with the help of the patient’s family member, rounded up enough cell phones to illuminate the OR while surgeons completed an emergency appendectomy.

3 0
3 years ago
Read 2 more answers
Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
Afina-wow [57]

Answer:

The attack is known as SQI Injection attack.

Explanation:

SQI injection usually exploit some security lapse in an application software for it to be able to work. It usually attack websites and mostly known as attack vector but may equally attack any type of SQL database of a company. These attacks allow attackers to steal and use identity, tamper with existing data on a system or website of the company or allow the complete disclosure of all data on the system. SQL Injection can also destroy the data or make it otherwise unavailable. Most importantly, it can become administrators of the database server or even cause reconciliation issues for such company transactions (e.g banks) such as voiding transactions or changing balances.

7 0
4 years ago
Other questions:
  • A stack queue can be implemented as a circular array stack dynamic linked list dynamic vector none of these
    5·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • In a bubble sort, you use a(n) ____ loop to make pair comparisons.
    5·1 answer
  • Is it important for a writer to include voice and point of view in writing because... Plz help
    15·1 answer
  • Llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
    7·1 answer
  • Which of the following letters do the most reliable websites end in?
    12·2 answers
  • What are binary code​
    7·2 answers
  • StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with o
    6·1 answer
  • Builder Software is used to create _____? answers: 3d digital art design for cameras audio special effects
    5·2 answers
  • Walter is developing a website for the logistics service he offers. He wants to make the website attractive, bright, and visuall
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!