Structured Query Language<span> (</span>SQL<span>)</span>
Answer:
Multi herramientas
Explanation:
Un kit tecnologico debe contener todas las herramientas necesarias para el trabajo que lo necesites, por ejemplo destornillador magnetico con varias puntas, herramientas para desmontar y por supuesto tener buena claridad para trabajar y alcohol isoprofilico de al menos 90+ para limpiar electronicos.
D. Time
It’s easy to access any time even after it was just purchased.
I hope this helped
Answer:
def getChar():
while True:
in1 = input('Enter first char: ')
try:
if len(in1) != 1:
raise
else:
in2 = input('Enter second char: ')
if len(in2) != 1:
raise
else:
break
except:
print('Enter just one character')
return in1, in2
def chars2string(in1,in2):
print(in1*5 + in2*5)
def main():
ls = getChar()
in1 = ls[0]
in2 = ls[1]
chars2string(in1, in2)
if __name__ == '__main__':
main()
Explanation:
The programming language used is python 3.
The script first defines a function getChar and makes use of a while loop in combination with try and except blocks and IF statements, the code ensures that both inputs that are entered by the user after the prompt are 1 in length. i.e. Just one character. This function returns the two characters that were entered.
The second function that is defined is chars2string this function takes two arguments, It repeats each argument five times and returns a joined string.
Finally, the main function is defined and it calls the getChar function first, the values that are returned by this function is assigned to two variables, that is then passed on to the chars2string function. The main function is called and the Joined string is printed to the screen.
<u>Explanation:</u>
<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.
a. Cindy may learn the difference between these two techniques used to create a malware attack:
- through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
- through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.
b. Here are some common suggestions;
- Never open attachments from strange email addresses.
- install a paid antivirus software.
- be mindful of websites with too many ads.