Answer:
Xrays, Ultrasounds, managing patient records, communicating with colleagues, etc.
Answer:
1) the wireless standards that can be implemented are; IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n. The pros and cons are in the attachment
2) 802.11g can be implemented in alice's restaurant. This is because it provides the fastest speed and has a wide range which will not be easily disturbed by other devices
3) Please check the attachment
4) Please check the attachment.
Explanation:
Solution:
initial = float(eval(input('Enter the monthly saving amount: ')))
x = (1 + 0.00417)
month_one = initial * x
month_two = (initial + month_one) * x
month_three = (initial + month_two) * x
month_four = (initial + month_three) * x
month_five = (initial + month_four) * x
month_six = (initial + month_five) * x
print('The sixth month value is: '+str(month_six))
Don't forget the saving amount, and initialize the balance with that amount. Inside the loop, work out and add the interest and then add the saving amount for the next month.
balance = 801
for month in range(6):
balance = balance * (1.00417)
print(balance)
Answer:
Sandbox Testing
Explanation:
Sandbox testing is used to test the new changes which is not their in your production server. Sandbox refers to a test server where we can deploy untested changes so that tester can test those changes separately
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).