1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
4 years ago
8

Write a python file called regex.py that defines several variables containing compiled regular expressions, as follows:

Computers and Technology
1 answer:
Naily [24]4 years ago
8 0
Start with
def regex(enter several variables heat):
You might be interested in
The statistically multiplexed wan technology that is specifically designed to carry multiple kinds of traffic (data and voice is
Flura [38]
To manage and organise multiple kinds of traffic, the wide area network statistically multiplexed technology that could be used would be the ATM. Also known as the asynchronous transfer mode, this type of connection using fixed cells in encoding data with regards to the situational traffic.
5 0
3 years ago
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
can you pls sub to my youttube channel, its called Yakobu, pls i will give you 30 points. pls dont just take points and not sub.
xxMikexx [17]

Answer:

Sure

Explanation:

I would love 2

5 0
3 years ago
What is the purpose of a mail merge field?
goblinko [34]

Answer:

Mail Merge is a way to send the same message to a large number of persons, with each one properly addressed to a specific person.

Explanation:

8 0
4 years ago
Read 2 more answers
You receive a suspicious text message from an unknown sender asking you to click on a link to access your current credit score.
Lyrx [107]

Answer: Phishing

Explanation: A cybercrime in which, a target or targets are contacted by email, telephone or text message by someone acting or posing as a legitimate institution to lure these targets or a target into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords is referred to as Phishing.

The CyberCriminals use these information to access important accounts, steal identities and even money.

Beside email and website phishing, there are phishing methods like 'vishing' (voice phishing), 'smishing' (SMS Phishing).

SOME FEATURES OF PHISHING EMAILS

The Emails are usually Too Good To Be True with a sense of Urgency, telling you to click on the link fast because the offers are limited.

They may tell you that your account will be suspended unless you update your personal details immediately and with attachments you are supposed to click on and from an unusual sender.

Whether it looks like it's from someone you know or don't know if anything seems out of the ordinary, unexpected, out of character or just suspicious please don't click on it the link. It might just be phishing.

7 0
3 years ago
Other questions:
  • Como puedo poner fondo a mi teclado​
    9·1 answer
  • How to select the entire table in microsoft excel
    11·1 answer
  • Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
    9·1 answer
  • How does the OS make multitasking possible?
    12·2 answers
  • Why might you receive a tax refund from the irs
    6·1 answer
  • HELP!! TIMED TEST!! Match the item to its description. 1. icons place where frequently used programs can be opened 2. Quick Laun
    13·1 answer
  • Mention 5 advantages of internet​
    8·1 answer
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • Create a method called nicknames that passes an array as a parameter. Inside the method initialize it to hold 5 names of your ch
    8·1 answer
  • Using AI to filter potential job applicants might be considered _____
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!