Answer:
INPUT
Explanation:
EXAMPLE PYTHON CODE
_______________________________________________________
INPUT CODE:
_______________________________________________________
foo = input('foo: ')#Have some text printed before the input field
bar = foo
print(bar)
_______________________________________________________
OUTPUT CODE:
_______________________________________________________
foo: Hello World!
Hello World!
>>> bar
'Hello World!'
>>>foo
'Hello World!'
computer ethis are crime done using computer technology (true )and(false)
answer- true
Following are the program to calculate even digits sum:
<h3>Program:</h3>
#include <iostream>//header file
using namespace std;
int main()//main method
{
int a[10],s=0,i;//defining an array and an integer variable
cout<<"Enter array values: ";//print message
for(i=0;i<=9;i++)//defining a loop that input array value
{
cin>>a[i];//input array value
}
for(int i=0;i<=9;i++)//defining loop that check array value
{
if(a[i]%2==0)//defining if block that checks even number condition value
{
s=s+a[i];//adding even number value
}
}
cout<<"The sum of even number is: "<<s;//print even number sum value
return 0;
}
Program Explanation:
- Defining a header file.
- Defining the main method.
- Inside the main method, an integer array "a", and two integer variable "s,i" is declared.
- In the next step, a for loop is declared that input the array value, and after input value another loop is declared that check even number value in array.
- In this loop it adds array value and after adding the value a print method is declared that prints its value.
Output:
Please find the attached file.
Find out more information about the even number here:
brainly.com/question/4184435
Answer:
Spyware
Explanation:
Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.
Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.
Bot: this is a software application that runs automated tasks. So, it is not the correct option.
Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.
Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.
Answer: D) Whitelisting
Explanation:
Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.
Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.
Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.
Therefore, option (A) is correct.