I have a very good example of the program you need written on Python. You can use this (sorry for bad tabulation):
import math
import math
def main():
function = input("Enter a function f(x):\n")
x = 0
y = 0
for rows in range(10,-11,-1):
for col in range(-10,11,1):
x=col
roundfx = round(eval(function))
if roundfx == rows:
print("o", end="")
if rows==0 and col==0 and not rows == roundfx:
print("+", end="")
if col == 0 and not rows == 0 and not rows == roundfx:
print("|", end="")
if rows==0 and not col==0 and not rows == roundfx:
print("-", end="")
else:
if not rows == 0:
if not col == 0:
if not rows == roundfx:
print(" ", end="")
print()
main()
Answer:
1. List the fields needed to gain information
2. Break down the date into smaller parts
3. identify the fields holding stored data
4.distribute the fields into tables by subject
5. identify the common fields for linking tables
Explanation:
edge 2021
Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution
Answer:
The five rules are described as follows:
Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.
Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.
Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.
Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.
Rule E does not perform any action. Thus it is when the action is denied.
Explanation:
Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.
Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.
Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.
Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.
Rule E does not allow any action in either direction thus it is when action is denied.