1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
3 years ago
14

Python coding beginners question

Computers and Technology
2 answers:
lana [24]3 years ago
5 0

Answer:

thanks a lot i was in need of it

Llana [10]3 years ago
4 0

Answer:

i really don't know

You might be interested in
What is thought to have caused the extinction of the dinosaurs?
AnnyKZ [126]
I think it's believed that an asteroid that hit Earth caused their extinction.
3 0
3 years ago
ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter
kolezko [41]

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

8 0
3 years ago
What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
stiks02 [169]

I think AAAAMMMMMHHVVV

i think suppose to be 3 v's

3 0
3 years ago
Read 2 more answers
Which part of a formal email is optional
EleoNora [17]
Contact information will be optional.
6 0
3 years ago
Read 2 more answers
Complete the add repair method!<br> (Will give the brainiest)
Masteriza [31]

Answer:

Give three(3) difference between Dot-matrix printer and the Daisy-wheel printer

6 0
3 years ago
Other questions:
  • How is the Task Manager helpful in displaying which resources your computer is using and how fast?
    5·2 answers
  • What is Blender's default save directory for movie AVI files?
    9·2 answers
  • Can someone help me with...A table can help? PLEASE
    8·1 answer
  • Which of the following is NOT one of the modules of a typical Decision Support System (DSS)? Select one: a. Customer information
    14·2 answers
  • A ___ is an organized collection of data in digital format that helps users to keep
    5·1 answer
  • Select the correct answer.
    5·1 answer
  • Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the lette
    9·1 answer
  • Read the scenario and then answer the question using only the information provided.
    7·1 answer
  • Frrrrrrrrrrreeeeeeeeee brainliest for u
    13·2 answers
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!