1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
11

Please write the code for this:

Computers and Technology
2 answers:
poizon [28]3 years ago
5 0

Answer:

w1 = input("Enter a word: ")

w2 = input("Enter a word: ")

print(w1,w2)

Explanation:

Bumek [7]3 years ago
3 0

w1 = input("Enter a word: ")

w2 = input("Enter a word: ")

print(w1,w2)

I wrote my code in python 3.8. I hope this helps.

You might be interested in
In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
Alex787 [66]

Answer:

False

Explanation:

If your server has been hacked, accessed by Remote access domain, these are tips or recommendations:

- Disable the Remote Desktop service on the affected computer and close port 3389 on the router so that your server is not accessible by Remote Desktop from the Internet, as another hacker can re-access and encrypt more files or encrypt over those already encrypted. .

- Ensure that the virus is not active, to do this place some files to see if they are encrypted or not.

- Scan the server with an updated antivirus.

- Open Task Manager, view active processes, and end the encryption process, which is usually Payload.exe

- Change the passwords of all users of the computer.

- Install a good paid antivirus, we recommend these:

- Configure the antivirus with password protection, so hackers cannot uninstall or deactivate it.

- You can use a desktop blocking program such as Eusing Maze Lock.

- Use a network firewall and VPN connection to remotely access the computer.

- Never use direct connection by Remote Desktop without VPN.

- Set up an online backup or an appropriate backup policy.

6 0
3 years ago
Which version represents the video project after the assembly cut has been completed, transitions and special effects have been
yuradex [85]

Answer:

D.final cut

Explanation:

it well help for the non-liris editing in film or others

7 0
3 years ago
Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
Elena-2011 [213]

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

5 0
3 years ago
Who here would like to play among us with me? <br> Time: Friday, November 13
Ira Lisetskai [31]

Answer:

BRO I WANNA!

My among us name is "A cop"

What time?

Explanation:

8 0
3 years ago
You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to
ArbitrLikvidat [17]

When you are working on a project to make or better a system to help people at your college or workplace to find jobs, then the system should be made for the student and work for the population and should be simple so people can work their way around it. You can use these following techniques.

  • Interviewing is a good way to have face to face and more interactive ways to communicate with your colleagues and clients. Unlike the next one which is a survey, this can be more personal and you'll get better answers than a computer program could.
  • Surveys are a great way to collect data and get people's opinions! It is also faster and more efficient if you're on a tight schedule.
  • A document analysis are the last ones to mention here. You can see how an already existing system is working and make a study based on that.

Five requirements in a traceability matrix that I would use are the following:

  1. Plan meetings with stakeholders who may want to work with your system development because they'll be the first ones that are upfront and into the project.
  2. Make more meetings and surveys to help people who are using your system do its purpose of finding people jobs at the workplace and college.
  3. Study your system to make sure it works and then do an analysis
  4. Make sure you do effective system documentation preparation and make sure to also have nice and helpful guides and other things that can help you and your system development.
  5. Have a team of Business Analysis visits stakeholders who will show them the ropes of the business requirements and how the system is being made and what design is going to be put out of the system.

Hope this helps. HAVE A BLESSED AND WONDERFUL DAY! As well as a great rest of Black History Month! :-)  

- Cutiepatutie ☺❀❤

6 0
4 years ago
Other questions:
  • A ________ is a small text file passed to a web browser on a user's computer by a web server.
    7·1 answer
  • Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users an
    7·1 answer
  • Which of the following is the MOST likely cause of the connectivity issues?A user of the wireless network is unable to gain acce
    5·1 answer
  • Write another function to convert a value to its word equivalent leveraging the following tuple - o Number = (‘One’, ‘Two’, … ‘N
    10·1 answer
  • TOPIC-PYTHON
    8·2 answers
  • Output devices reproduce or display which of the following
    12·2 answers
  • When you purchase an item in a store, you may be charged __________.
    11·2 answers
  • 3.There are 3 arrays that hold related data at each position (parallel). The first array holds product codes. The second holds t
    7·1 answer
  • What is the importance of server modules and add-ons?
    9·1 answer
  • What do you think is the most effective way to ensure that code adheres to good coding standards.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!