In programming technology it used as common and some place it is varies.
If variable declared as string data type position represents the character of the string. If variable declare as integer data type position represent as cell reference.
Curly braces containing a number indicates the position of character in it data type is string
At the same it also indicates the position of a array .
Dim a as string = “HELLO”
A(2) – it is represents “L” where it started 0 optional bas
Dim a(10) as integer =(1,2,3,4,5,6,7,8,9,10)
A(2) – it represented array cell position answer is “3”.
Answer:
Answer written in python.
Explanation:
#ask user for the first integer.
first_number = int(input("enter first number: "))
#ask user for the second integer
second_number = int(input("enter second number: "))
#add both and store in a variable, result.
result = first_number + second_number
#print out the result
print ( f"the answer to the problem is {result} calculated by adding {first_number} to {second_number}")
The worded lines after the # sign are called comments and are used to describe what the following lines of code does making it easier to read and understand by other programmers or by the same programmer coming back to it after a while.
Answer:
Codes of conduct
Explanation:
Codes of conduct are a set of rules or norms established by an organization for all employees, students or users, to ensure individual responsibilities and proper practices. The code of conduct can cover overall behaviour of individuals in an organization, but a specific code of conduct can be developed for proper computer use in order to establish what is appropriate and available to use in the organization´s computers, and also to restrict or avoid non related content.
Answer:
PEAP is the correct answer to the given question .
Explanation:
The PEAP are implemented to meet the demands because it is very much identical to the EAP-TTLS design also it includes the server-side PKI authentication .
- The main objective of PEAP is to establish the protected TLS tunnel for protecting the authentication process, as well as a server-side encryption authentication.
- The PEAP is also used for validating the application it validating her process with the help of the TLS Tunnel encryption between the user and the verification.
- All the other options are not suitable for the to meet the requirements of the design that's why these are incorrect option .