Answer:
i dont know if this help but To do this, we will use a 'for loop'. The “for loop” allows the programmer to call a section of code repeatedly within a range of values. The range() function will return integer values depending on the arguments.
Explanation:
a cell phone is changing our views in both polite and unpolite ways because these days I see people at dinner tables on their phones taxting and not actually socializing with the people around them but at the same time people who like other people posts on instagram and wright good comments are being very polite to the person who posts it.
Answer:
- Local fisherman recover the body of Major Martin off the coast of Spain
.
- Spanish officials pass off the information in the briefcase to German agents.
- Major Martin's name appears on a casualty list in a British newspaper.
- Germany prepares for an imminent attack on the island of Sardinia.
Explanation:
This above is the order in which Operation Mincemeat was executed in WW2 to deceive the Germans into believing that the Allies were going to invade the Balkans directly instead of Sicily which was their actual target.
The plan involved a fictitious Major Martin who had secret documents about the Allied invasion of the Balkans. After the body was released from a British submarine, it washed up in Spain where it was found by local fishermen.
Spanish officials then passed the information in the briefcase Major Martin had to German intelligence. To further reinforce the ruse, the British published Major Martin's name in a casualty list.
The Germans were thoroughly convinced and switched forces from Sicily for the defence of the Balkans and the island of Sicily.
Answer:
event based and time based
Explanation:
OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated
An LFM IDPS
Using an LFM which stands for log file monitor, the system
is able to review log files generated by servers, network devices, and even
other idpss. Its main purpose is to look for signatures and patterns which might
indicate that an intrusion is in the pipeline or has already happened.
This
intrusion detection is enhanced due to the fact that LFM is in a position to
look at several log files from different systems.