Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Aman Kumar 4 years, 11 months ago
- 1 answers
Posted by Chirag Sharma 4 years, 11 months ago
- 1 answers
Posted by Athmapriya P 4 years, 11 months ago
- 1 answers
Posted by Athmapriya P 4 years, 11 months ago
- 1 answers
Tec Om 4 years, 11 months ago
Posted by Royal Thakur ? 4 years, 11 months ago
- 1 answers
Posted by Yogitha Sanga 4 years, 11 months ago
- 0 answers
Posted by Yogita Ingle 4 years, 11 months ago
- 1 answers
Posted by Hem Jakhar 4 years, 11 months ago
- 0 answers
Posted by ? ? 4 years, 11 months ago
- 5 answers
? ? 4 years, 11 months ago
? ? 4 years, 11 months ago
Posted by Tec Om 4 years, 11 months ago
- 0 answers
Posted by ? ? 4 years, 11 months ago
- 3 answers
Posted by ? ? 4 years, 11 months ago
- 3 answers
Rithika D 4 years, 11 months ago
? ? 4 years, 11 months ago
The every moment you are observing here along with blinking time will never come in your whole life once again .... <hr style="width:70%;" color="red">
<div id="time"></div><div class="container"> <div id="more"></div> </div> </body> </html>
Posted by Ashwani Devi 4 years, 11 months ago
- 1 answers
Yogita Ingle 4 years, 11 months ago
When you close a document in Word, the document itself leaves your screen and you can no longer edit it. The program remains open for you to switch to another document. When you exit Word, the entire program closes and must be opened again in order to edit any documents.
Posted by Nasreen Yasmeen 4 years, 11 months ago
- 0 answers
Posted by Royal Thakur ? 4 years, 11 months ago
- 2 answers
Posted by ? ? 4 years, 11 months ago
- 4 answers
Aadya Singh 4 years, 11 months ago
Aseem Mahajan 4 years, 11 months ago
Posted by ? ? 4 years, 11 months ago
- 3 answers
? ? 4 years, 11 months ago
Posted by ? ? 4 years, 11 months ago
- 4 answers
? ? 4 years, 11 months ago
Posted by ? ? 4 years, 11 months ago
- 5 answers
? ? 4 years, 11 months ago
? ? 4 years, 11 months ago
? ? 4 years, 11 months ago
? ? 4 years, 11 months ago
Posted by By Mty 4 years, 11 months ago
- 1 answers
Posted by Pradeep Kumar L 4 years, 11 months ago
- 3 answers
Tec Om 4 years, 11 months ago
Yogita Ingle 4 years, 11 months ago
We take the set of numbers on which the binary operations are performed as X. The operations (addition, subtraction, division, multiplication, etc.) can be generalised as a binary operation is performed on two elements (say a and b) from set X. The result of the operation on a and b is another element from the same set X.
Thus, the binary operation can be defined as an operation * which is performed on a set A. The function is given by *: A * A → A. So the operation * performed on operands a and b is denoted by a * b.
Posted by Pallavi Prasad 4 years, 11 months ago
- 1 answers
Sia ? 4 years, 3 months ago
It helps in storing and creating typed documents in a new way. It provides the function of Creating the documents with basic editing, saving, and printing of it or same. It helps in Copy the text along with moving deleting and pasting the text within a given document.
Posted by Yanika Bhardwaj 4 years, 11 months ago
- 1 answers
Dev Lohani 4 years, 11 months ago
Posted by Success Revenger 4 years, 11 months ago
- 0 answers
Posted by Lakshay Kaushik 4 years, 11 months ago
- 1 answers
Tec Om 4 years, 11 months ago
Posted by Pallavi Prasad 4 years, 11 months ago
- 1 answers
Meghna Thapar 4 years, 11 months ago
1. Privacy Concerns: 90 percent of devices collected at least one piece of personal information via the device, the cloud or the device’s mobile application. The vast majority of devices collecting information like name, address, date of birth or even health and credit card information. Even worse is the fact that many devices transmit this information across networks without encryption. If users misconfigure their home network, then they are only one step away from exposing this data through wireless networks. Cloud services, which many of these devices use, are also extremely vulnerable. However, it is likely that the majority of these devices actually need personal information to function.
2. Insufficient Authentication/Authorization: 80 percent failed to require passwords of sufficient complexity and length. A huge number of users and devices rely on weak and simple passwords and authorizations. Citing examples of this, HP found that many devices and their cloud components accepted passwords like “1234” or “123456”. Many users that configured accounts with weak passwords also used the same password in the cloud for cloud products. HP points out that a strong
password policy is basic security, but even still most solutions failed.
3. Transport Encryption: 70 percent of devices used unencrypted network services. Transport encryption is where information that is being transferred from one device to another device is encrypted from the outset of any communication. Transport encryption will be crucial given that most of the devices are transmitting data that most people would consider crucial. However, most devices surveyed failed to encrypt data, even when the devices were using the Internet. HP noted that the need for encryption is particularly strong given the amount of information that is being passed between the device, the cloud and mobile applications.
4. Web Interface: 60 percent raised security concerns with their user interfaces. These issues included:
persistent cross-site scripting, poor session management and weak default credentials. From this, hackers were able to identify valid user accounts and take them over using things like password reset features.
5. Insecure Software: 60 percent did not use encryption when downloading software updates. Given the number of software updates that will be required to make everything work together, HP says that it was “alarming” to find that so little of this software was encrypted during downloads. Even worse, some of the downloads that were tested could be intercepted and uploaded into a file system in Linux where the software could be seen or even modified.
myCBSEguide
Trusted by 1 Crore+ Students
Test Generator
Create papers online. It's FREE.
CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app
Gaurav Seth 4 years, 11 months ago
Numeric
A numeric value is any representation of data which has a numeric value. Python identifies three types of numbers:
Complex number: A number with a real and imaginary component represented as x+yj. x and y are floats and j is -1(square root of -1 called an imaginary number)
Boolean
Data with one of two built-in values <code>True</code> or <code>False</code>. Notice that 'T' and 'F' are capital. <code>true</code> and <code>false</code> are not valid booleans and Python will throw an error for them.
Sequence Type
A sequence is an ordered collection of similar or different data types. Python has the following built-in sequence data types:
Dictionary
A dictionary object is an unordered collection of data in a key:value pair form. A collection of such pairs is enclosed in curly brackets. For example: <code>{1:"Steve", 2:"Bill", 3:"Ram", 4: "Farha"}</code>
1Thank You