Create a secure password (10 points)
Ask the user how long they want their password to be, then return a randomized password that includes all the letters of the alphabets, capitalization, numbers, and special characters.

Answers

Answer 1

Answer:

python

Explanation:

import random

secret_length = input("how long you want the secret to be?\n")

secret_length = int(secret_length)

characters = r"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789$%^&*("
secret = ""

for i in range(secret_length):

   secret = secret + random.choice(characters)

print(secret)


Related Questions

Susan is writing a program to draw a square. What is the last step of the program?

1. Clear

2. Pen Up

3. Stage

4. Stop All Sounds

Answers

Susan is writing a program to draw a square. The last step of the program is pen up. The correct option is 2.

What is programming?

The commands' pen down and pen up instruct the turtle, respectively, to leave or not leave ink on the screen as it moves. It is a dynamic, prototype-based multi-paradigm scripting language that supports imperative, functional, and object-oriented programming paradigms.

JavaScript, which operates on the client side of the web, can be used to plan or program how web pages should act in response to an event.

Therefore, the correct option is 2. Pen Up.

To learn more about programming, refer to the link:

https://brainly.com/question/11023419

#SPJ1

You, as a network administrator, are calculating the range of host ip addresses for a subnet (the targeted subnet). If the next subnet's network id is 192. 168. 50. 119, what is the targeted subnet's broadcast address?

Answers

Since your subnet's network ID is 192.168.50.119, then the targeted subnet's broadcast address will be: 192.168.50.118.

What is the term broadcast address about?

To send a message to every computer on a network, use the 255 address (in binary notation, a host address of all ones). Just keep in mind that no host can be given the first or last address in any network or subnet. 254 hosts should now accept IP addresses from you.

Note that the final portion of the host component of an address, which begins in the third or fourth octet, always contains the following information: This is the broadcast address if the host bits are all set to the binary value "1". This is the network address if all host bits are set to "0."

In the case above, since the subnet is 192.168.50.119, then the targeted subnet's have to be: 192.168.50.118

Learn more about subnet's from

https://brainly.com/question/28865562
#SPJ1

look at the traffic you captures, you will find there are many different protocols and ip addresses. what is your host ip address? what is the suspected zoom server ip address? why do you believe that ip address is the zoom server?

Answers

While IP addresses can pinpoint your location, they do not offer the same level of specificity as a house address. Additionally, IP addresses will never reveal any of your personal information, including name, phone number, and email address.

What is IP addresses?

IP addresses is defined as a lengthy string of numbers given to each device linked to a network that uses Internet Protocol as the primary means of communication; it is comparable to your home or office's postal address in the digital world.

The type of device you are using and your IP address will be collected and stored by Zoom even if you choose not to create an account with it.

Thus, while IP addresses do identify your whereabouts, they do not provide as much detail as a home address. Additionally, IP addresses will never reveal any of your personal information, including name, phone number, and email address.

To learn more about IP addresses, refer to the link below:

https://brainly.com/question/18722788

#SPJ1

What is the commonly attributed name of the threat actor and an example of one of the open-source software that they have trojanized?.

Answers

The threat actor is frequently referred to as "Ideologues," and one of the open-source programs they have trojanized is an example of this.

Ideologues are divided into two groups of danger actors: terrorists and hackers. These two types of attackers can be combined due to their shared objectives.

Hackers and terrorists utilize different techniques to commit cybercrimes, nevertheless. A threat actor, sometimes referred to as a malevolent actor, is any people or group that wreaking harm online on purpose. They cause harm to people or organizations by exploiting holes in computers, networks, and systems.

A threat actor, often referred to as a malicious actor, is a person or a group of persons who carry out an action with the aim to harm computer systems, devices, networks, or other objects in the cyberspace.

Threat actors commit cybercrime to obstruct operations and take advantage of vulnerabilities that have been identified. Threat actors come from a range of educational backgrounds and have a range of skills and resources.

Threat actors are distinct from hackers and attackers in that, in contrast to hackers, they are not always technical professionals.


Learn more about Threat actors here:

https://brainly.com/question/28929562

#SPJ4

an algorithm typically consists of which of the following traits? a.) an input, logical steps, and an output b.) html, javascript, and css c.) a front end, an api, and a back end d.) a display tier, a logic tier, and a data tier

Answers

An algorithm typically consists the following traits: a.) an input, logical steps, and an output.

What is a problem?

In Computer technology, a problem simply refers to any issue or challenge that is encountered by an individual (person) or business organization (company), which typically requires a solution.

What is an algorithm?

An algorithm can be defined as a standard formula (procedures) which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software proffer a solution to a particular problem under appropriate conditions.

In this context, we can reasonably infer and logically deduce that the three (3) main traits of an algorithm include the following:

An input.Logical steps.An output.

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

________ are formally defined, standardized processes that involve day-to-day operations.

Answers

Structured processes are formally defined, standardised processes that incorporate day-to-day operations.

What do you mean by standardized processes?

Process standardisation refers to the formalisation and recording of various tasks, techniques, and administrative steps in a firm. Input, transformation phases, and output comprise a process (delivery). Because these operations are performed by multiple people, there must be some kind of organisation and an execution plan for the entire team to follow. Standardization of operational processes serves as a guide, defining procedures and the flow that must be followed in order to achieve the desired results and deliver on time. Process standardisation is not a new concept. Engineer Frederick Taylor began to evaluate manufacturing workers' labour in the late nineteenth century, discovering which movements could be standardised.

To learn more about standardized processes
https://brainly.com/question/14546181

#SPJ4

one of the major differences between the imperative and functional programming languages is that the functional programming languages do not

Answers

One of the major differences between the imperative and functional programming languages is that the functional programming languages do not have side-effect.

What is a Programming languages?

A programming language is a computer language that programmers (developers) use to communicate with computers. It is a set of instructions written in any language (C, C++, Java, Python) to perform a specific task.

A programming language is primarily used to create desktop applications, websites, and mobile applications.

What is a Imperative programming language?

As the name implies, imperative programming is a type of programming paradigm that specifies the steps that computers should take to complete or finish a goal.

What is a Functional programming language?

As the name implies, functional programming is a type of programming paradigm that was created expressly to support a purely functional approach to problem solving. This programming style is most commonly used when solutions are easily expressed in function and have little physical meaning.

To learn more about Functional programming language, visit: https://brainly.com/question/24233420

#SPJ4

for which type of account is the line item display generally active?please choose the correct answer

Answers

In SAP FI, a general ledger account master's company code segment contains a control field called line item display field.

What is in active account?monetary terms thanks to: a. Active account. refers to a brokerage account where a large number of transactions take place. Brokerage companies may charge a fee if an account produces insufficient levels of activity.Line item kinds are translated to a numerical priority value that acts as a selection criteria for advertisements. The priority rises with decreasing number. For instance, "Sponsorship" line items with guarantees have a priority of 4, while "Bulk" line items without guarantees have a priority of 12.The name, unit price, quantity, and total price of each product sold may all be fields in a Line Items table together with their respective product and invoice identification numbers. The order date, salesperson, and invoice identification number may all be fields in an invoices table.

To learn more about active account refer to:

https://brainly.com/question/25897080

#SPJ4

a hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a/n

Answers

Forest is a  hierarchical tree of active directory domains within one organization that is linked to other trees in the organization

What is a forest in the active directory domain?

Active Directory Domain Services (AD DS) uses a logical structure called a forest to group one or more domains together. After that, the domains offer authentication services while storing objects for users or groups. The forest only has one domain in an Azure AD DS-managed domain.

Difference between forest and a domain:

A grouping of one or more domain trees is referred to as a forest. The domains in the example.com domain tree and the domain tree for movie.edu might belong to the same forest. A forest does not have a common namespace as its foundation; a domain tree does. A forest is given its name after the first domain that was established there.

Hence to conclude a forest is a hierarchical tree of active directory domains

To know more on active directories follow this link

https://brainly.com/question/24215126

#SPJ4

What system acquisition method has the advantages of helping clarify user requirements for ill-defined problems, verifying the feasibility of the design, promoting genuine user participation and a close working relationship between systems developers and users?.

Answers

Prototyping is a system acquisition approach that offers the benefits of clarifying user needs for ill-defined issues, evaluating the feasibility of the design, encouraging true user engagement, and fostering a tight working connection between system developers and users.

What precisely is prototyping?

Design teams test their ideas by creating tangible prototypes, which can range from paper to digital.

Teams construct prototypes with varying levels of realism to capture design thoughts and conduct user testing. Using prototypes, you may refine and analyze your ideas, helping your organization to release the right items.

It is a term used in a variety of domains, including semantics, design, electronics, and software development. A prototype is generally used by system analysts and users to evaluate a new design that intends to improve precision.

Learn more about Prototyping:

https://brainly.com/question/28187820

#SPJ1

Ospf can propagate a default route if there is no static default route configured on the router?.

Answers

No, the Ospf cannot propagate a default route if there is no static default route configured on the router.


Reason: You cannot simply redistribute a static route in OSPF to establish a default route, unlike RIP and EIGRP. Even if a default route is present in the routing table, Cisco's OSPF solution won't automatically forward it to the remainder of the network. This is due to the fact that OSPF uses a link state algorithm, which tracks links rather than routes.

What is a router?

Any device, physical or virtual, that transmits data between two or more packet-switched computer networks is referred to as a router. A router examines the Internet Protocol (IP) address of a particular data packet's destination and then the router determines the most effective route to take it there, and then forwards the packet in accordance with its findings.

To learn more about router, use the link given
https://brainly.com/question/27960570
#SPJ4

How much money would that same computer cost in louisville county, kentucky? what about in coffee county, alabama?.

Answers

The about of money that you save if you bought it in Davidson County is:

It will cost about $1,097.5 in Williamson County.It will cost about $1,092.5 in Davidson County.$5 is the amount which will be saved.What does saving money entail?

Savings is the money that remains after expenses and other commitments have been subtracted from income. Savings are the sum of money that would otherwise be lying about, not being risked on investments or used for consumption.

Deferred consumption, or not spending money, is saving. Savings strategies involve setting money aside in places including cash, investment funds, pension accounts, and deposit accounts. Reducing expenses, such as regular expenses, is another aspect of saving.

Hence,

In  Williamson County, the sales tax rate is 9.75% = 9.75% × $1,000 = $1,097.5

In Davidson County , the sales tax rate is 9.25% =  9.25%  × $1,000 = $1,092.5

The total amount saved will be: $1,097.5 - $1,092.5 = $5.

Learn more about money  from

https://brainly.com/question/27167637
#SPJ1

See full question below

If you were to buy a $1,000 computer in Tennessee, how much would it cost in

Williamson County? How much would you save if you bought it in Davidson County?

Answer:

Louisville County $1,060

Coffee County $1,050

Explanation:

Louisville: 6 x 1,000 = 6,000 hit the percent button and you get 60 then just add that to the original 1,000. Do the same thing with Coffee County

an oval in a flowchart is also referred to as a terminator; it indicates the beginning and/or end of a program. question 17 options:

Answers

True, an oval in a flowchart is also referred to as a "terminator"; it indicates the beginning and/or end of a program.

What is Flowchart in programming?

A flowchart is a diagram that depicts an algorithm. To solve a problem, programmers frequently use it as a program-planning tool. It employs symbols that are linked together to represent the flow of information and processing.

"Flowcharting" refers to the process of creating a flowchart for an algorithm.

Flowchart Design Guidelines:

When creating a flowchart, some rules should be followed.

Rule 1: The first statement in a flowchart must be the keyword 'start.'

Rule 2: The flowchart's final statement must contain the keyword 'end.'

Rule 3: An arrow line must connect all symbols in the flowchart.

Rule 4: The arrow line cannot be associated with the flowchart's decision symbol.

To learn more about Flowchart, visit: https://brainly.com/question/6532130

#SPJ4

Your company offers continuous online training. If each online lesson is 20 minutes long, and there are 90 lessons, how many hours will each employee complete to finish all the lessons?.

Answers

The number of hours it would take each employee complete to finish all the lessons is: c) 30.

What is a proportion?

In Mathematics, a proportion can be defined as an equation which is typically used to represent (indicate) the equality of two (2) ratios. This ultimately implies that, proportions can be used to establish that two (2) ratios are equivalent and solve for all unknown quantities.

By applying direct proportion to the given information, we have the following:

1 lesson = 20 minutes.

90 lessons = X minutes.

Cross-multiplying, we have:

X = 20 minutes × 90 lessons

X = 1800 minutes.

Note: 60 minutes is equal to one (1) hour.

Therefore, the time in hours is given by:

Time = 1800/60

Time = 30 hours.

Read more on direct proportion here: brainly.com/question/1266676

#SPJ1

Complete Question:

Your company offers continuous online training. If each online lesson is 20 minutes long, and there are 90 lessons, how many hours will each employee complete to finish all the lessons?

a) 33

b) 1.5

c) 30

d) 90

the is an expression in linear programming models that states mathematically what is being maximized or minimized.

Answers

the is an expression in linear programming models that states mathematically. The Objective function is being maximized or minimized.

What are linear programming models?

A linear function is maximized or minimized when subjected to different restrictions using the mathematical modeling technique known as linear programming. This method has been effective in directing quantitative choices in industrial engineering and corporate planning. Linear programming models include:

Solving linear programming by Simplex method.Solving linear programming using R.Solving linear programming by graphical method.Solving linear programming with the use of an open solver.

To learn more about, linear programming models, use the link given
https://brainly.com/question/24065112
#SPJ4

Please help me answering this Python questions
1} Which data structure is best suited to store and update different data structures?
A) Boolean
B) Integer
C) List
D) String

2} Which of the following would be an optimal data structure for an algorithm to update and change information?
A) Dictionary
B) Integer
C) List
D) String

3 }What is one of the common characteristics of an efficient program?
A) Containing complicated functions and including a lot of useful variables
B) Containing the fewest number of steps required to solve the problem
C) Looking neat and being easy to read
D) Requiring effective computers to run efficiently

4} Which of the following best describes why an IDLE is useful for programming in Python?
A) IDLEs are laid out well.
B) IDLEs can help identify mistakes at early stages of programming.
C) It is possible to program in different languages with the same IDLE.
D) It is possible to use more libraries with IDLEs than with other editors.

5} Which of the following is a main characteristic of procedural programming?
A) Being inefficient
B) Containing only functions
C) Focusing on objects and modularization
D) Focusing on processes and methods

6} Write pseudocode for a program to get ready for bed.

Answers

Answer:

1.A 2.D 3.D 4.C 5.D

Explanation:

6. im not sure

write a function called comparepartialstr that uses function strncmp to compare two strings input by the user. the function should input the number of characters to be compared, then display whether the first string is less than, equal to or greater than the second string.

Answers

The function called comparepartialstr that uses function strncmp to compare two strings input by the user is

comparepartialstr

⇒ TAKES IN : ''Test1'' ,  ''Test2'' , ''4''

⇒ PRINTS : ''Comparison of first 4 chairs : Test1 = Test2 ''

When would you use a strncmp?The sole reason to use strncmp() here rather than strcmp(), assuming that the string in message is intended to be null-terminated, is to avoid it from searching past the end of message in the event that message is not null-terminated.The strncmp() built-in method compares just the string pointed to by string1 with the string pointed to by string2's first count characters. A NULL character (0) designating the string's end should be present in the string parameters sent to the function.The following value is returned by the strncmp() function and shows how the strings are related: Value. Meaning. string1 is inferior to string2 by less than 0.

Learn more about strncmp refer :

https://brainly.com/question/13162177

#SPJ4

What is the maximum number of indented code blocks that an if/elif/else statement will execute?.

Answers

There is no limit to the number of indented code blocks that an if/elif/else statement can execute.

What is code blocks?

Code blocks is a free, open-source cross-platform IDE that works with a variety of compilers, including GCC, Clang, and Visual C++. It is written in C++ and uses the wxWidgets GUI toolkit. The capabilities and functionalities of a plugin architecture are defined by the plugins that are given. Code blocks is currently focused on C, C++, and Fortran. It contains a bespoke build system as well as Make support, which is optional. Code blocks are being developed for Windows and Linux, and they have already been ported to FreeBSD, OpenBSD, and Solaris. The most recent binary given for macOS is 13.12, which was released on December 26, 2013 (compatible with Mac OS X 10.6 and later), however more recent versions can be produced, and MacPorts provides version 17.12.

To learn more about code blocks

https://brainly.com/question/28753487

#SPJ4

scenario 1: neighboring wifi has been set up at 2.412 ghz. of the options presented below, which minimizes network interference?

Answers

Try to choose unique channel frequencies to avoid interference.

What is signal interference?

The appropriate space that must be kept clear in order to turn off a home signal is referred to as the "signal overlap." TALQ/TACL signaling requires an adequate distance of at least 100 meters, and MACL/MAUQ and Modified Lower Quadrant signaling requires an adequate distance of at least 75 meters.

Some other known techniques to minimize interference are:

Reduce the power level: A good way to reduce interference is to lower the radio frequency power of wireless transmissions. Equalizers and filtering Filters can be added to communication lines whose properties are known to reduce interference.

In general way,

Transmit in many locations. If two transmitters are spaced apart, they can both use the same frequency concurrently.

broadcast using several frequencies. If two transmitters use different frequencies, they can both transmit at the same time and cover the same area.

Send out at various times.

Hence to conclude unique channel frequencies help you to reduce the network interference

To know more on network interference follow this link

https://brainly.com/question/29352369

#SPJ4

question 4 what are the key elements of effective visualizations you should focus on when creating data visualizations? select all that apply.

Answers

The key elements of effective visualizations you should focus on when creating data visualizations are Sophisticated use of contrast, Clear meaning, Visual form and Refined execution.

What is Data visualizations?

Data visualization is the use of common graphics to represent data, such as charts, plots, infographics, and even animations. These information visualizations communicate complex data relationships and data-driven insights in an easy-to-understand manner.

Data visualization can be used for a variety of purposes, and it is important to note that it is not limited to data teams. It is also used by management to communicate organizational structure and hierarchy, and data analysts and data scientists use it to discover and explain patterns and trends. According to Harvard Business Review, data visualization can be used for four different purposes: idea generation, idea illustration, visual discovery, and everyday dataviz.

To learn more about Data visualizations, visit: https://brainly.com/question/27815542

#SPJ4

getting 100 backlinks from 100 different websites is better for ranking purposes than getting 100 backlinks from 10 different websites because

Answers

Getting 100 backlinks from 100 different websites is better for ranking purposes than getting 100 backlinks from 10 different websites because search engines consider link diversity as a sign of organic, independent endorsements of the content of a website.

What is a website?

A website is a collective name which connotes a series of webpages that are interconnected and linked together with the same domain name, so as to provide certain information to end users.

What is a search engine?

A search engine simply refers to a software program that is designed and developed to search the World Wide Web (WWW) or various websites, and identify items that correspond to the keywords (string of characters), which must be specified by an end user.

In conclusion, for the purpose of website ranking, it is better to have 100 backlinks from 100 different websites because link diversity is considered organic, independent endorsements of the content of a website by search engines.

Read more on search engine here: brainly.com/question/27965856

#SPJ1

a software application will not allow a sale to be processed if a customer is over its credit limit. this is an example of:

Answers

A parentive control is an example of software application will not allow a sale to be processed if a customer is over its credit limit.

What do you mean by software application?

An application programme (also known as a software application, application, or app for short) is a computer programme that is meant to perform a specific task that is not related to the operation of the computer itself, and is typically used by end-users. Examples include word processors, media players, and accounting software. All applications are referred to collectively by the collective noun "application software." The other major types of software are system software, which is related to computer functioning, and utility software ("utilities"). Applications can be packed with the computer and its system software or released separately, and they can be written in proprietary, open-source, or project-based code. Typically, the term "app" refers to apps for mobile devices such as phones.

To learn more about software application
https://brainly.com/question/26790316

#SPJ4

What does it mean when a computer is processing
A computer is doing a task
B user is thinking
C the computer is recharging
D software is engaging

Answers

When a computer is processing it means that (A) computer is doing a task.

State the functions of the CPU.

Any digital computer system's central processing unit (CPU), which consists of the system's main memory, control unit, and the arithmetic-logic unit, is its main part. It serves as the actual brain of the entire computer system, connecting numerous peripherals including input/output devices and auxiliary storage units. On an integrated circuit chip known as a microprocessor, the Control Processing Unit (CPU) of contemporary computers is housed.

The Central Processing Unit (CPU) is distinguished by the following functions:

As the brain of the computer, the CPU is regarded.All data processing processes are carried out by the CPU.Information including data, preliminary findings, and directions are saved (program).All computer parts follow its instructions when operating.

To learn more about the Central Processing Unit, use the link given
https://brainly.com/question/26411941
#SPJ9

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings?
a) The virtual machine will be a Generation 1 virtual machine.
b) The virtual machine will be named VM1.
c) The virtual machine will have 4 GB of memory, which is expandable up to 36 GB.
d) The virtual machine will have a 127 GB dynamically expanding hard disk.

Answers

Among all the given statements, the one that is true if Miguel creates a virtual machine with default settings is: “The virtual machine will be a Generation 1 virtual machine.” Hence, Option A is correct.

What are the default settings?

When a user-configurable setting is assigned to a piece of software, a computer programme, or a hardware, it is known as the default value in computer science. Presets or factory presets are other names for these settings, particularly when applied to electronic devices.

A default in computer technology is a predesigned value or setting that a computer programme will use if the programme user does not specify a value or configuration.

Therefore, Option A is correct.

Learn more about default settings from here:

https://brainly.com/question/28493813

#SPJ1

which network component is responsible for defining rules and formats a computer must used when sending information across a network?

Answers

Network protocols responsible for defining rules and formats a computer must used when sending information across a network because It is a predefined set of rules that govern how data is transmitted between devices on the same network.

What is a network protocol?

A protocol is a set of rules for formatting and processing data in networking.

Network protocols are similar to a computer language. Although the computers in a network may use very different software and hardware, the use of protocols allows them to communicate with one another.

Standardized protocols are analogous to a common language that computers can use, in the same way that two people from different parts of the world may not understand each other's native languages but can communicate using a shared third language.

If one computer uses the Internet Protocol (IP) and another computer does as well, they can communicate — just as the United Nations uses its six official languages to communicate with representatives from all over the world. However, if one computer uses IP and the other does not, they will be unable to communicate.

There are different protocols for different types of processes on the Internet. Protocols are frequently discussed in terms of the OSI model layer to which they belong.

To know more about Network protocols, visit: https://brainly.com/question/14672166

#SPJ4

Which of the following terms refers to the feelings or emotions that a game’s visuals create?

A.
backdrop

B.
mood

C.
ludonarrative

D.
engagement

Answers

Ludonarrative is the one that refers to the feelings or emotions that a game's visual create

What is Ludonarrative?

ludonarrative (typically uncountable, plural ludonarratives) (usually uncountable, plural ludonarratives) a video game's ludic (gameplay) and narrative aspects coming together.

The term "ludonarrative," which was created by game designer Clint Hocking [15], is derived from the Latin words "Ludus" (which roughly translates to "game" or "play") and "narrative," which denotes a meaningful recount of related events. The intersection of gameplay and narrative components in video games is referred to as ludonar- rative.

Ludonarrative vs narrative

Conflict between a video game's narrative as told through the gameplay and the narrative as told through the story is known as ludonarrative dissonance. Ludonarrative, a combination of ludology and narrative, describes the meeting point of ludic (gameplay) and narrative elements in a video game.

Hence to conclude that Ludonarrative is the proper term that refers to the feelings that a game's visuals create

To know more on ludonarrative emotions follow this link

https://brainly.com/question/18664544

#SPJ1

does this destination ip address correspond to the host, access point, first-hop router, or some other network-attached device? explain.

Answers

At time t = 24.811093 in the trace, the TCP SYN is transmitted. 00:13:02:d1:b6:4f is the MAC address of the host that is transmitting the TCP SYN.

What are the host, access point, and first-hop router?

A host is a computer or other device that interacts with other hosts on a network (also referred to as a "network host"). Clients and servers on a network are examples of hosts because they send and receive data, services, or applications.

What is an access point used for?

the access point picture

An access point is a component that establishes a WLAN, or wireless local area network, typically in a workplace or sizable structure. An access point transmits a WiFi signal to a predetermined area after being connected to a wired router, switch, or hub via an Ethernet cable.

Hence to conclude the destination ip address is 00:13:02:d1:b6:4f '

To know more on ip and networking follow this link

https://brainly.com/question/27961221

#SPJ4

an algorithm is a finite set of instructions that accomplish a specific task. algorithms can be expressed in a variety of ways, such as natural language, diagrams for example: flowchart and pseudo code. clarity and readability are important considerations when expressing an algorithm in a programming language. algorithms executed by programs are implemented using programming languages. every algorithm can be constructed using combinations of sequencing, selection, and iteration. sequencing is the application of each step of an algorithm in the order in which the code statements are given. a code statement is a part of program code that expresses an action to be carried out.

Answers

Selection is the application of an algorithm to a specific set of data. iteration is the application of an algorithm to a data set repeatedly, until a desired result is achieved.

I believe that algorithms can be expressed in a variety of ways, depending on what is most clear and readable for the specific task. For example, an algorithm could be expressed in natural language, in a flowchart, or in pseudo code. It is important to consider clarity and readability when expressing an algorithm in a programming language, so that the code is easy to understand and follow. Algorithms can be implemented using programming languages, and every algorithm can be constructed using combinations of sequencing, selection, and iteration.

The Different Ways That Algorithms Can Be Expressed

Algorithms are a set of instructions that are used to accomplish a specific task. They can be expressed in a variety of ways, such as natural language, flowcharts, and pseudo code. Clarity and readability are important considerations when expressing an algorithm in a programming language. This is because the code needs to be easy to understand and follow. Algorithms can be implemented using programming languages, and every algorithm can be constructed using combinations of sequencing, selection, and iteration.

Learn more about Algorithms:

https://brainly.com/question/13800096

#SPJ4

Given two integers low and high representing a range, return the sum of the integers in that range. For example, if low is 12 and high is 18, the returned values should be the sum of 12, 13, 14, 15, 16, 17, and 18, which is 105. If low is greater than high, return 0.

Answers

Answer:

Explanation:

Program PascalABC  and Result:

C++:

#include <iostream>

int sum_range(int l, int u, int sum) {

   if(l>u) return 0;

   else {

       for(l;l<=u;l++) {

           sum+=l;

       }

       return sum;

   }

}

int main(int argc, char* argv[]) {

   int l,u,sum; std::cin>>l>>u;

   std::cout << "The result: " << sum_range(l,u,sum) << std::endl;

   return 0;

}

you should rekey an encryption key: group of answer choices when a key is leaked to unauthorized parties when some major event occurs, such as a major new version of the file that the key protects every two to three months regardless of other factors more often on larger cryptonets

Answers

You should rekey an encryption key are : Option A,C & D.

What are encryption keys?It describes the encryption keys that are used to encrypt data.A random string of bits created especially to jumble and unscramble data is often used as an encryption key. Algorithms used to construct encryption keys make sure that each key is distinct and unexpected. The encryption code is more difficult to decipher the longer the key created in this manner. Data is encrypted using 256-bit AES algorithm keys in both the IBM and T10 encryption systems. The US government recognizes and endorses the 256-bit AES encryption standard, which supports three distinct key lengths. The maximum key length permitted by AES is 256 bits.The encryption key server is capable of employing both symmetric and asymmetric encryption techniques. A single key is used for both encryption and decryption in symmetric, or secret key, encryption.

Learn more about Encryption keys refer to :

https://brainly.com/question/9979590

#SPJ4

You should rekey an encryption key are : Option A,C & D.

Every two to three months regardless of other factors.When some major event occurs, such as a major new version of the file that the key protects.When a key is leaked to unauthorized parties

What are encryption keys?It describes the encryption keys that are used to encrypt data.A random string of bits created especially to jumble and unscramble data is often used as an encryption key. Algorithms used to construct encryption keys make sure that each key is distinct and unexpected.The encryption code is more difficult to decipher the longer the key created in this manner. Data is encrypted using 256-bit AES algorithm keys in both the IBM and T10 encryption systems.The US government recognizes and endorses the 256-bit AES encryption standard, which supports three distinct key lengths. The maximum key length permitted by AES is 256 bits.The encryption key server is capable of employing both symmetric and asymmetric encryption techniques. A single key is used for both encryption and decryption in symmetric, or secret key, encryption.

The complete question is,

1. You should rekey an encryption key:

A. every two to three months regardless of other factors

B. more often on larger cryptonets

C. when some major event occurs, such as a major new version of the file that the key protects

D. when a key is leaked to unauthorized parties

To Learn more about Encryption keys refer to :

brainly.com/question/9979590

#SPJ4

Other Questions
jon krakauer implies right away that he admires chris mccandless. group of answer choices true false use the delta method to approximate the standard error for the square root of the sample average g In which play by shakespeare do three witches say, "double, double, toil and trouble"?. Mr. and Mrs. Johnson know that in 6 years, their daughter Ann will attend State College. She will need about $20,000 for the first year's tuition. How much should the Johnsons deposit into an account that yields 1.5% interest, compounded annually, in order to have that amount? Round your answer to the nearest thousand dollars. Capillary walls are only one layer of cells thick. Passage of oxygen into and out of the capillaries is controlled most by which process?. Which of the b vitamins are intricately involved in the breakdown and processing of proteins?. people know all their own biases; they just know they cannot or should not say those beliefs aloud, so they hide them. a. true b. false c. i don't know Which sentence best conveys anne frank's viewpoint regarding moral choices in anne frank: the diary of a young girl?. Assignment 1-3You want to do research on how sugar affects attention in small children. Compare and contrast how this could be studied usingthe experimental and survey method. Make sure that you explain the appropriate parts as you set it up. Which method do you thinkwould be better to use and why? Cye-Na is starting a juice stand. It takes her 15 minutes to prepare 3 1/4 cups of juice. How many hours would it take her to prepare 32 1/2 cups of juice? Females are affected by alcohol differently than males because eA professional organizer may play all of the following general roles EXCEPT:Select one:OOa. Professional mentorb. Office managerc. Friendd. Time management coach the nurse is working with a client with a new onset of atrial fibrillation during a three-month follow-up visit. the healthcare provider is planning a cardioversion, and the client asks the nurse why there is a wait for the treatment. what is the best response by the nurse? Please help me I need help with this question Which class of acid will have an increased concentration in someone who is suffocating?. What is the estimated effective nuclear charge, zeff, experienced by an electron in a 3p orbital of a chlorine atom?. Bre'Asia wanted to buy 5 pizzas. She used a coupon for $7 off the entire order. Let p representthe cost of 1 pizza. Which expression below can be used to represent this situation? a type of comedy that derived from burlesque but includes higher comedy, wit, irony, poking fun of serious subjects, and often political content is called A grocery store is expressing security and reliability concerns regarding the on-site backup strategy currently being performed by locally attached disks. The main concerns are the physical security of the backup media and the durability of the data stored on these devices Which of the following is a cost-effective approach to address these concerns?A. Enhance resiliency by adding a hardware RAID.B. Move data to a tape library and store the tapes off siteC. Install a local network-attached storage.D. Migrate to a cloud backup solutionPlease also explain why not other options correct answe7 2/3