Answer:
A. Define boundaries
C. Deny access
D. Delay access
Explanation:
A barrier is a material or structure used to prevent or block access. Barriers can either be natural or structural and are used for many purposes usually for security reasons. The following are functions of barriers either natural or structural:
- Define areas of boundaries
- Delay or slow access. Example is the use of speed bumps to slow down vehicles.
- Provide access to entrances such as the use of gates
- Deny access to unauthorized personnel and allowing authorized personnel.
No. social media makes people share too much information about their personal lives.
Answer:
Explanation:
The following code is written in Python. It asks the user for an input. Then cleans the input using regex to remove all commas, whitespace, and apostrophes as well as making it all lowercase. Then it reverses the phrase and saves it to a variable called reverse. Finally, it compares the two versions of the phrase, if they are equal it prints out that it is a palindrome, otherwise it prints that it is not a palindrome. The test case output can be seen in the attached picture below.
import re
phrase = input("Enter word or phrase: ")
phrase = re.sub("[,'\s]", '', phrase).lower()
reverse = phrase[::-1]
if phrase == reverse:
print("This word/phrase is a palindrome")
else:
print("This word/phrase is NOT a palindrome")
<u>Drastic change of over society Computers:</u>
In society computer has drastically changed and it has been used to for varies purpose to do analysis or storing data, as decisions making tools. Purpose computer been found is to do huge calculation. “Compute” word has been derived to computer. Computer later stage it diverted is purpose from calculation to information store device.
Computers have heavy effect the communication in normal word and business world. Especially social media took over the control of computers. In today’s world four type of ethical issue are known in computer mainstream in the workplace they are.
1. Crime (computer)
2. failure of responsibility in the computer.
3. Protection of software records and documents etc.
4. End user data protection and privacy.
99% of computers are protected with firewalls and antivirus. But still hackers can hack the computer and steal the data.