Answer:
The correct answer to the following question:
while sub < SIZE AND foundIt = "N"
Explanation:
Firstly, we start the pseudocode after that set the variable sub to 0 and size to 1 of num type and also set a num type array VALID_ITEM[5] and its elements are 27,53,84,89,95.
Than set string type variable foundIt to "N", then we set a while loop and correct its condition is "< SIZE AND foundIt = "N" ".
Than starts if condition which is "item = VALID_ITEM[sub]", if the condition is true than foundIt = "Y", after that endif.
Than increment the variable sub, after that endwhile, after this, we start if condition which is "foundIt = "Y" " if the condition is true then output "Valid item number" or else "Invalid item number", and then we endif and after all stop the pseudocode.
Answer: False
Explanation:
This code code not deletes element from deq. This insert element at the beginning of deq. if it was deq.pop_front(elem) then it would have deleted the first element.
Therefore, it is false.
Answer:
def SwapMinMax ( myList ):
myList.sort()
myList[0], myList[len(myList)-1] = myList[len(myList)-1], myList[0]
return myList
Explanation:
By sorting the list, you ensure the smallest element will be in the initial position in the list and the largest element will be in the final position of the list.
Using the len method on the list, we can get the length of the list, and we need to subtract 1 to get the maximum element index of the list. Then we simply swap index 0 and the maximum index of the list.
Finally, we return the new sorted list that has swapped the positions of the lowest and highest element values.
Cheers.
Answer: Progress report presentation
Explanation: Progress report presentation is the presentation that consist the progress report of an individual's work .It describes about the project/work that a person has started to complete the project. These reports are made for the clients, students, colleagues etc.
Progress report in this case is made for the client to make them understand about the Jeff's work , his contribution, changes he invoked in it, achievements ,completion of the project, benefits of it etc. This presentation will encourage the client to buy the software made by Jeff.
There are two main types of encryption - <span>symmetric and asymmetric.
Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the
key, they can read the message.
What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two
smaller keys. One of the keys is public and one is kept private.
A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them