Answer:
<h3>
<em><u>C</u></em><em><u>.</u></em><em><u> </u></em><em><u> </u></em><em><u>City</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>state</u></em><em><u> </u></em><em><u>where</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>was</u></em><em><u> </u></em><em><u>published</u></em></h3>
Explanation:
<h3>#CarryOnLearning</h3>

<span>There are two sentences here that hint at a bad work habit.
1.She always shows up for work later than she is expected to but delivers her assignments as per her deadlines.
Here we see that Samantha not only is late to work, but she does it regularly. This is an example of a bad work habit, as being on time is one of the responsibilities of an employee. This also sends a bad massage to her coworkers, if she is not punished for it. That can lead to disorganization and loss of production.
2.She always tries her best to learn new skills even though she does not show up for work regularly.
Again, showing up for work is a must, except your company does not explicitly have a flexible work schedule that allows people to work from home or make their own working hours. In Samantha's case that does not seem to be the case and thus this is a bad habit. </span>
<span />
Answer: Explanation:
Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.
For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions. So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".
By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.
In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.
name = input("What's your name? ")
print("Hello " + name + ", welcome to my quiz!")
score = 0
di = {"qustion1": "answer1", "qustion2": "answer2", "qustion3": "answer3", "qustion4": "answer4", "qustion5": "answer5", "qustion6": "answer6",
"qustion7": "answer7", "qustion8": "answer8", "qustion9": "answer9", "qustion10": "answer10"}
for x in di:
user_answer = input(x+" ")
if user_answer == di[x]:
print("That's correct!")
score += 1
else:
print("The correct answer is " + str(di[x]))
print("You got "+str(score)+" out of 10!")
I iterated through a dictionary with the questions and answers as the keys and values respectively. I hope this helps!