what is password policy with example

Answers

Answer 1

A password policy defines the password strength rules that are used to determine whether a new password is valid.

For example, password strength rules might specify that the minimum number of characters of a password must be 5.

What is IBM® Security Privileged?

An appliance-based solution called the IBM® Security Privileged Identity Manager offers privileged credential and access management, application identity management, and session recording.

A password policy establishes the standards that passwords for a service must fulfill, such as the length and character types that are permitted and forbidden. In addition, the password policy may state that an entry is forbidden if it is in a dictionary of offensive words. You must first load a dictionary.ldif file into the IBM® Security Privileged Identity Manager before you can choose this option in the user interface.

You can specify the following standards and other rules for passwords:

Minimum and maximum lengthCharacter restrictionsFrequency of password reuseDisallowed user names or user IDsSpecify a minimum password age

Establishing password guidelines:

A password policy can be made by an administrator to be used with one or more services. For instance, you might establish a rule in your password policy that says a character can only be used three times in a password.

Making a rule for password policies:

You can make a rule for an existing password policy as an administrator. You may, for instance, design a rule that mandates the minimum quantity of digits in a password.

Altering the password guidelines:

To comply with your organization's password standards, an administrator can modify a password policy. As an illustration, you could modify a password policy to specify the minimum and maximum number of characters needed for the password.

Altering a password policy stipulation:

A password policy rule may be modified by an administrator. You may, for instance, modify or eliminate the settings for an existing rule.

A password policy being deleted:

A password policy that is no longer required to regulate password entries can be deleted by an administrator.

Individual password guidelines:

You can incorporate unique logic for password generation using the IBM Security Privileged Identity Manager server. You can use a specific rule, a customized generator, or a combination of the two to add the logic.

Learn more about password policy click here:

https://brainly.com/question/28114889

#SPJ4


Related Questions

Which of the following addresses is not allowed on the Internet?
A. 191.192.168.1
B. 191.168.169.254
C. 172.32.255.0
D. 172.31.12.251

Answers

Answer: D: 172.31.12.251

Manufacturing production systems
can be classified as

Answers

Answer:

Job-shop, Batch, Mass and Continuous production systems.

Answer:

Explanation:

Production systems can be classified as Job-shop, Batch, Mass and Continuous production systems.

when do you use the following sequence of commands: pivottable tools -> analyze -> pivottable -> options -> generate getpivot data?

Answers

Prevent Excel from using GETPIVOTDATA function.

What is Excel ?

A piece of software developed by Microsoft that employs formulas and functions to organize data and numbers using spreadsheets. Financial analysis is performed by companies of all sizes using Excel analysis, which is widely used worldwide.

What is Financial analysis?

Financial analysis is the process of assessing the performance and suitability of businesses, projects, budgets, and other financial-related transactions. Financial analysis is frequently used to determine whether a company is solid, solvent, liquid, or profitable enough to justify a financial investment.

By typing = (the equal sign) in the cell you want to return the value to and clicking the PivotTable cell that contains the data you want to return, you can quickly enter a straightforward GETPIVOTDATA formula.

Under Excel Lookup and Reference functions, the GETPIVOTDATA Function is listed. An Excel Pivot Table can use the function to extract data from specific fields. The Pivot Table is frequently employed in financial analysis to enable more thorough analysis of given data.

Learn more about GETPIVOTDATA click here:
https://brainly.com/question/29034341
#SPJ4

what is the first priority while serving customers at pick-up

Answers

Answer:

Your priority at Pick-up is to acknowledge and serve all customers promptly. Remember, pickup is often our only chance to delight a customer. Equally important to promptly serving all customers is how we do them.

Explanation:

At Pick-up, promptly acknowledging and serving every customer is your first concern. Remember that Pick-up is frequently our only opportunity to please a customer. The way we serve our customers is just as important as doing so promptly.

How do you acknowledge the concern of a customer?

Managing a business involves responding to client complaints about subpar products, bad service, and other issues. Here's how your business may transform these complaints into chances to strengthen your brand and win over new clients.

Consumer Complaints:

Consumer complaints are grumblings from clients about anything involving your business, like a faulty product or poor client service. By paying attention to the customer's concerns, you can successfully address the issue and satisfy their complaint.

Your Brand and Customer Loyalty:

Your business's ability to respond professionally also has a big impact on whether you retain clients or lose them. Maintaining your company's reputation and brand health should be one of your primary business objectives.

By offering subpar customer service, it's simple to lose clients. Some customers won't bring their complaints to your customer service team, but others won't think twice about spreading negative feedback online or on social media. Customer loyalty is severely harmed when subpar products and poor customer service are combined.

Know more about acknowledgement of customer concern click here:

https://brainly.com/question/21042698

#SPJ4

i really need help on this

Answers

A privacy setting guide that would fit the above description is:

Ensure that cookie settings are restricted to zero or only necessary cookiesEnable AD block on the browserDisable "Push Metadata"Disable collection of Usage DataDisable share live location Use strong passwordsUse Two-Factor Authentication (Don't use SMS)Remove personal details such as contact, birth etc from public access etc.

What is a privacy settings guide?

Many websites and apps include privacy options that allow you to limit who may view your profile and what information visitors can see.

Privacy Guide, developed by Go. ogle's Safety Engineering Center (GSEC), is a step-by-step guided tour of some current privacy and security features in Chrome — so you can make and manage the correct choices for you in one place.

You can utilize privacy settings to indicate whether or not you agree to the collection, usage, and dissemination of your personal information.

That is why it is critical to choose and establish privacy settings on all social media accounts, internet services, devices, and browsers that you are comfortable with.

Learn more about privacy settings:
https://brainly.com/question/13650049
#SPJ1

identify the device or body pain computer

Answers

A computer is the gadget I'm using. I am not experiencing any body pain at the moment.

What is computer?

A computer is a digital electrical machine that may be programmed to automatically perform arithmetic or logical operations (computation). Programs are generic sets of operations which modern computers are capable of performing. These programmes allow computers to do a variety of jobs. A computer system is a "complete" computer which includes the necessary hardware, operating system (primary software), and peripheral equipment for "full" functioning. This term can also refer to a group of computers that are linked and collaborate, such as a computer network or even a computer cluster.

To learn more about computer
https://brainly.com/question/21474169

#SPJ1

your customer uses a posting period variant with special periods, and you need to allow specific users to post in these specials periods. what do you assign in the posting period variant? please choose the correct answer

Answers

Since your customer uses a posting period variant with special periods, and you need to allow specific users to post in these specials periods. the thing that you assign in the posting period variant is option  A: An authorization group to period intervals 1 and 2.

What are rules for posting period variants?

The posting period variant with unique periods, SAP FI image To keep accounting periods open for posting and all closed periods balanced, the posting period variant is employed. This is utilized for posting purposes during the beginning and end of the fiscal year. These posting periods can be linked to one or more company codes.

The year-end closing time is divided into special periods. They merely split the previous posting period into many closing periods as a result. You can then produce a number of supplemental financial statements thanks to this. 12 posting periods typically make up a fiscal year.

Hence, The definition of authorization groups depends on the solution. They have a technical name that is verified in the field SMUDAUTHGR of authorization object SM SDOC.

Learn more about authorization from

https://brainly.com/question/14450567
#SPJ1

If alain were asked to take notes at the executive team meeting, the document he created would be called what?

Answers

If Alain were asked to take notes at the executive team meeting, the documents he created would be the meeting minutes.

What is document?

A written or typed piece of paper with some data on it is called a document. A written record of the proceedings is a meeting minute, often known as meeting notes.

Meeting minutes include taking notes for many individuals. They are not the same as the meeting agenda, which is a prepared list of the tasks that participants hope to accomplish during the meeting.  

Thus, if Alain were asked to take notes at the executive team meeting, the documents he created would be the meeting minutes.

To learn more about document, refer to the link below:

https://brainly.com/question/20696445

#SPJ1

your company, stormwind, requires that you implement security, and you have been asked to define and implement a security policy. you have to specify how long a password must be kept before it can be changed. which of the following password policies will you use to accomplish this?

Answers

There is no one answer to this question as it depends on the specific security needs of the company. Some possible password policies that could be used to accomplish this goal include:

requiring passwords to be changed every 30 days, every 60 days, or every 90 days. Other possible policies could include requiring a minimum password length, prohibiting the use of common words or phrases, or requiring a combination of letters, numbers, and special characters.

Importance of the security policy:

The security policy is important because it helps to ensure that sensitive company data and information is protected. By specifying how often passwords must be changed, the policy helps to prevent unauthorized access to company systems and data.

Learn more about the security policy:

https://brainly.com/question/5673688

#SPJ4

Kayla is on-location shooting a wedding while her other employees will be holding down the office and taking care of any walk-ins. Kayla left them written reminders and instructions for some things that they need to take care of in her absence. How did Kayla MOST LIKELY leave these instructions?


in shot lists being created for upcoming events


in purchase orders for equipment that needs to be ordered


in memos she wrote prior to leaving


by telling the models who would be photographed that day

Answers

Kayla most likely leaves these instructions in short lists being created for upcoming events. The correct option is A.

What are the instructions?

Instructions are the things that a person tells other people or groups of people to do. These are compulsory things that are told to do. Shortlists are made to give instruction in a revision tone.

Kayla is leaving the place, so she is making reminder notes top tell her colleagues what to do in her absence. So, short noes are good options.

Therefore, the correct option is A. in shot lists being created for upcoming events.

To learn more about instructions, refer to the link:

https://brainly.com/question/2601676

#SPJ1

string comparisons are made from left to right.
a. true
b. false

Answers

Answer:

A) True

I hope this helped!! Please like this!

A.true explanation: allows the use of logical restrictions on its inquiries such as OR, AND, and NOT. The conditional LIKE must be used in conjunction with wildcard characters.

Which excel feature allows you to select all cells in the column with inconsistent formulas.

Answers

CTRL + D is used to fill the formula column down

What is the feature?

Hold down the SHIFT key while pressing one of your arrow keys, selecting the cell containing the erroneous formula, and then releasing the SHIFT key. This will select all the cells, including the one that is inconsistent. then choose one of these: To fill the formula down, press CTRL+D while selecting the cells below.

Excel's Go To Special Function[1] enables you to quickly choose all cells that match a set of requirements, such as cells that contain: Formulas (numbers, text, locals, errors) (numbers, text, locals, errors) Constants (text, numbers, logic, and mistakes)

Hence to conclude that CTRL+D excel feature allows you to select all cells in the column with inconsistent formulas.

To know more about the ctrl+D option and excel features follow this link

https://brainly.com/question/24749457

#SPJ4

CODEHS PLEASE HELP ME(check attached pic)

Answers

Answer:

JavaScript Notation (If it is not JavaScript, Comment on this problem and I will immediately change it.)

var width = prompt("Input width.")

var length = prompt("Input length.")

if (length === width) {

    console.log(length*width , " is your area of the square.")

} else {

    console.log(2*length*2*width , " is your perimeter of the rectangle.)

what are desirable characteristics for a hash function? you can select multiple answers. group of answer choices uniformly distributed output avoids clustering deterministic output 0 to size-1 fast

Answers

The following are the desirable characteristics of a hash function

What are the desirable characteristics of a hash function?

The purpose of a hash function is to fit a set of inputs of any size into a table or other data structure with fixed-size elements.

Qualities of a Good Hashing Function. A strong hash function has the following four qualities:

1) The data being hashed entirely determines the value of the hash.

2) The input data are all used by the hash function.

3) The hash function "uniformly" disperses the data among all conceivable hash values.

A message or file can be used as a variable-length input for the hash function, which produces a fixed-length output that is typically much shorter than most input values.

Hence to conclude above are the desirable characteristics of hash function

To know more on hash function please follow this link

https://brainly.com/question/13149862

#SPJ4

there are two commands that we can use to save new configuration changes that we apply to the switch. what are these two commands?

Answers

end & 'Ctrl + Z' are the two commands that we can use in this case

What are the two commands used?

Type the end command or press the CTRL+Z keys simultaneously on the keyboard to exit any prompt, even the privileged EXEC mode.

The following are the uses for ctrl+z and exec mode:

1) Undo the operation

2)end helps you to get back to the one you are searching for

configuration changes:

When you alter component data that is subject to change control, a configuration change happens. Specific component fields and classification attributes are subject to change control. Configuration information refers to the fields and attributes you choose to use for change control.

Hence to conclude ctrl + z and end are the two commands we need

To know more on keys follow this link below:

https://brainly.com/question/24847632

#SPJ4

what syntax is used to target a device based on its features by adding a feature and its value to the media attribute?

Answers

The proportion between the display's width and height is known as the aspect ratio of a display device. The width and height are represented by the two values (x:y), which are separated by a colon.

What are the syntax function target device feature?

The study of syntax focuses on the relationship between sentence structure and other linguistic information, including phonology, morphology, semantics, and pragmatics.

Therefore, Syntax is the structure used to arrange words and phrases to generate sentences. Let's take a look at an illustration of how the syntax of a sentence might be changed.

Learn more about syntax function here:

https://brainly.com/question/14213243

#SPJ1

In HTML, write a short paragraph describing something from a book or movie (two or three sentences). Be sure to mention the book or movie title in the paragraph, and format appropriately.

Answers

To write in HTML, you need to understand the format of the HTML itself. This is an example how to write a paragraph in HTML.

<html>

   <head>

       Black Adam

   </head>

   <body>

       <p>Black Adam is one of DC movies that airs in 2022.</p>

       <p>Directed by Jaume Collet-Serra, and featuring Dwayne Johnson as Black Adam.</p>

       <p>Black Adam is rated for PG 13.</p>

   </body>

</html>

First, you need to define what language you want to write in this case, it's HTML so write <html> and don't forget to complete with </html> at the end.Next, there is two part in html which is head and body. Head or header is intended for the name of the website, in this case it's the movie name. While body is intended for the content of the website, or in this case it's the paragraph.Next, you need to write the sentence to make a paragraph. In order to to that, you need to write <p> follows by the sentence and complete with </p>.

Learn more about HTML here

https://brainly.com/question/7169423

#SPJ1

the windows 10 education edition supports hyper-v but not nested virtualization.
a. true
b. false

Answers

False,Windows 10 education support Hyper-V and nested virtualization.The 64-bit editions of Windows 10 Pro, Enterprise, and Education support Hyper-V.

Does Windows 10 education support Hyper-V and nested virtualization?The 64-bit editions of Windows 10 Pro, Enterprise, and Education support Hyper-V. You can use the capability known as nested virtualization to run Hyper-V inside of a Hyper-V virtual machine.This is useful for testing configurations that typically call for several hosts or running a Visual Studio phone emulator in a virtual machine.The use of nested virtualization is supported both on-premises and on Azure. On the following variants of Windows 10, the Hyper-V role can be activated:Windows 10 Business.Win 10 Pro.Using Windows 10 Education. The capacity to build virtual machines is one of Windows 10's capabilities.A bundled operating system called a "virtual machine" can run on top of a "host" operating system.Multiple "guest" operating systems can run on the same host thanks to virtualization, which also makes moving virtual computers between hosts simple.

To learn more about Windows 10 refer

https://brainly.com/question/28847407

#SPJ1

When can fraction turned to decimal form and vise versa be useful in our daily activities?

Answers

Answer:

Explanation:

We use decimals all the time when dealing with money, weight, length, and so on. Decimal numbers are used when greater precision is required than whole numbers can provide. For example, when we weigh ourselves on the scale, we do not always find that the weight equals a whole number. To determine our exact weight, we must first comprehend what the decimal value on the scale means

In baking, fractions indicate how much of an ingredient to use. Time is told using fractions; each minute is a fraction of an hour. , when there is a sale, fractions are used to determine discounts. Me, as an electrician I use to use fractions when determining the length of a pipe for bending

the sales team has talked with thad about needing insights into product updates, changes, and approval processes so they can communicate more accurate and up-to-date information to customers. which system's information is the sales team needing access to? a. plm b. scm c. crm d. erp to make this proprietary information available to sales reps to share with customers concerns thad because of the risk of information getting to his company's competitors. what would theoretically protect the information in this scenario? a. bom b. encryption c. automation d. nda thad hopes that opening this channel of communication with the sales team will also help the production team by giving them access to select .

Answers

The system's information that the sales team is needing access to is crm. To theoretically protect the information in this scenario encryption is used. The correct options are c and b respectively.

What is encryption?

Encryption is the process of converting information into a secret code that conceals the true meaning of the information. Cryptography is the science of encrypting and decrypting information.

Unencrypted data is referred to as plaintext in computing, while encrypted data is referred to as ciphertext.

The goal of encryption is confidentiality, which is achieved by converting the message's content into a code.

The purpose of digital signatures is to ensure the integrity and authenticity of a message by verifying the sender and indicating that the content has not been altered.

The system information that the sales team requires is crm. In this scenario, encryption is used to theoretically protect the information.

Thus, the correct options are c and b respectively.

For more details regarding encryption, visit:

https://brainly.com/question/17017885

#SPJ1

In an interview, you were asked to explain the steps involved in a successful authentication by a radius server. How should you answer?.

Answers

The access point receives a request from the supplicant (AP). The AP requests credentials from the user.

What is radius server ?In order to authenticate dial-in users and grant them access to the required system or service, remote access servers can communicate with a central server using the client-server protocol and software known as RADIUS.On a UNIX or Windows server, a RADIUS Server is a background process that operates. It enables you to keep track of user profiles in a main database. As a result, if you have a RADIUS Server, you can decide who can access your network.The RADIUS Client makes requests to the RADIUS Server whenever a user tries to connect to it. Only once the RADIUS Server authenticates and approves the user can the user establish a connection to the RADIUS Client.The precise makeup of the RADIUS ecosystem affects how the RADIUS Server functions. All servers do, however, support AAA. A RADIUS Server may also function as a proxy client for other RADIUS Servers in some RADIUS ecosystems.

To learn more about radius server refer :

https://brainly.com/question/28529631

#SPJ4

The great Debators movie

Answers

Answer:

Mr. Tolson was a teacher at Wiley College and the head debate coach. He was very passionate about his students and debate. In the movie, The Great Debaters, Mr. Tolson was portrayed as a tough but loving teacher. He pushed his students to be the best they could be and believed in them even when they didn't believe in themselves.

write a program that computes how much the user owes for parking in a particular parking garage. the garage charges $4.25 per hour. however, the minimum amount they charge is $7. this means that if the total comes to something less than $7, the user is still charged $7. in addition, if the user was parked for more than 3 hours, they earn a 25% discount. for example, if they were parked for 4 hours, they would owe $17. but since they were parked for more than 3 hours, they get 25% off and only owe $12.75. follow the comments in main to ask the user how many hours they parked and compute their total.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that computes how much the user owes for parking in a particular parking garage.

Writing the code:

import java.util.Scanner;

public class Discounts {

public static void main(final String [] args) {

 System.out.println("How many hours have you been parked ?");

 final Scanner s = new Scanner(System.in);

 final int hours = s.nextInt();

 final double chargePerHour = 3.50 ;

 final double totalCharge = hours * chargePerHour;

 if(totalCharge > 20.0) {

  System.out.println("You owe $20.0");

 }

 else {

  System.out.println("You owe $" + totalCharge);

 }

}

}

See more about  JAVA at brainly.com/question/12975450

#SPJ1

implement map using open addressing with linear probing. hint: you must create a new concrete class that implements mymap using open addressing with linear probing, as described on p. 989. see the lecture on linear probing. for simplicity, use f(key)

Answers

Here is the sample how to implement Mymap in Java programming

public class Exercise {

public static void main(String[] args) {

 // Create a map

 MyMap<String, Integer> map = new MyHashMap<>();

 map.put("Sebastian", 35);

   map.put("Andre", 37);

 map.put("Luke", 25);

 map.put("Caroline", 25);

 map.put("Thomas", 23);

 map.put("Makaela", 23);

 map.put("Shayne", 56);

 map.put("Will", 24);

 System.out.println("Entries in map: " + map);

 System.out.println("The age of Luke is " +

  map.get("Luke"));

 System.out.println("The age of Will is " +

  map.get("Will"));

 System.out.println("Is Shayne in the map? " +

  map.containsKey("Shayne"));

 System.out.println("Is Jack in the map? " +

  map.containsKey("Jack"));

 System.out.println("Is age 37 in the map? " +

  map.containsValue(37));

 System.out.println("Is age 35 in the map? " +

  map.containsValue(35));

 System.out.print("Keys in map: ");

 for (String key : map.keySet()) {

  System.out.print(key + " ");

 }

 System.out.println();

 System.out.print("Values in map: ");

 for (int value : map.values()) {

  System.out.print(value + " ");

 }

 System.out.println();

 map.remove("Shayne");

 System.out.println("Entries in map " + map);

 map.clear();

 System.out.println("Entries in map " + map);

}

}

Learn more about Java Programming here:

https://brainly.com/question/12972062

#SPJ4

(30) write a multithreaded program (using posix pthreads) that calculates various statistical values for a list of numbers. this program will be passed a series of numbers on the command line and will then create five separate worker threads. one thread will determine the average of the numbers, the second will determine the maximum value, the third will determine the minimum value, the fourth thread will determine the median value, and the fifth thread will determine the standard deviation. for example, suppose your program is passed the integers 90 81 78 95 79 72 85 the program will report the average value is 82.86 the minimum value is 72.00 the maximum value is 95.00 the median value is 81.00 the standard deviation is 7.77 the variables representing the average, minimum, maximum, median, and standard deviation values will be stored globally. the worker threads will set these values, and the parent thread will output the values once the workers have exited. comment your code and submit it in a file named numstats.cpp

Answers

Programming multiple, concurrent execution threads is known as multithreading.

Explain the multithreading ?On a single CPU, multithreading creates the appearance of parallel processing. The processor actually switches by utilizing a scheduling technique. Alternately, it may flip in response to a mix of outside inputs (interrupts) and the order in which the threads were prioritized.True parallel computing involves multithreading on many processor cores. Together, several microprocessors may provide the desired outcome more quickly. There are several concurrent, simultaneous tasks going on at once.Teams working on development projects nowadays value multithreading. And as technology advances, it will still be crucial.More operations are being conducted on several processor cores as we approach the limitations of what can be done on a single CPU. For AI, this is very crucial.

Learn more about multithreading refer :

https://brainly.com/question/15062443

#SPJ1

write a python program that outputs numbers in a digital led format. the user will enter two integers a (scale) and b (number) separated by a space from the keyboard. the scale size should between [1,5]. error check. output number b in the digital led format where a is the scale. use the following led patterns:

Answers

Python program that simulates a 7-segment display, with digits at different scales.

Python code

# Drawing the led digit line by line, repeating the horizontal led as many times as the scale indicates.

def prints(a, mat):

   for i in range(5):  

        if (i % 2 == 0):  

            for j in range(5):

                if (mat[i][j] == 1):

                    print('', end = '-')                

                else: print('', end = ' ')                      

        else:  

           for x in range(int(a)):

               for j in range(5):

                   if (mat[i][j] == 1):

                      print('', end = '|')    

                   else: print('', end = ' ')

               print()      

        print()

       

 # Defining led patterns using elements of the arrays for each digit, charging them with zeros and ones, the ones indicate the leds that form the digit either horizontally or vertically.  

def digit0(a):    

   mat = [ [ 0, 1, 0, 1, 0 ],    

   [ 1, 0, 0, 0, 1 ],    

   [ 0, 0, 0, 0, 0 ],    

   [ 1, 0, 0, 0, 1 ],    

   [ 0, 1, 0, 1, 0 ] ]

   

   prints(a, mat)

def digit1(a):

   mat = [ [ 0, 0, 0, 0, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 0, 0, 0, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 0, 0, 0, 0 ] ]

   

   prints(a, mat)

def digit2(a):

   mat = [ [ 0, 1, 0, 1, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ],

   [ 1, 0, 0, 0, 0 ],

   [ 0, 1, 0, 1, 0 ] ]

   prints(a, mat)

def digit3(a):

   mat = [ [ 0, 1, 0, 1, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ] ]

   prints(a, mat)

def digit4(a):

   mat = [ [ 0, 0, 0, 0, 0 ],

   [ 1, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 0, 0, 0, 0 ] ]

   prints(a, mat)

def digit5(a):

   mat = [ [ 0, 1, 0, 1, 0 ],

   [ 1, 0, 0, 0, 0 ],

   [ 0, 1, 0, 1, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ] ]

   prints(a, mat)

def digit6(a):

   mat = [ [ 0, 1, 0, 1, 0 ],

   [ 1, 0, 0, 0, 0 ],

   [ 0, 1, 0, 1, 0 ],

   [ 1, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ] ]

   prints(a, mat)

def digit7(a):

   mat = [ [ 0, 1, 0, 1, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 0, 0, 0, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 0, 0, 0, 0 ] ]

   prints(a, mat)

def digit8(a):

   mat = [ [ 0, 1, 0, 1, 0 ],

   [ 1, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ],

   [ 1, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ] ]

   prints(a, mat)

def digit9(a):

   mat = [ [ 0, 1, 0, 1, 0 ],

   [ 1, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ],

   [ 0, 0, 0, 0, 1 ],

   [ 0, 1, 0, 1, 0 ] ]

   prints(a, mat)

# Checking the numbers

def checkDigit(a, num):

   if (num == 0):

       digit0(a)

   elif (num == 1):

       digit1(a)

   elif (num == 2):

       digit2(a)

   elif (num == 3):

       digit3(a)

   elif (num == 4):

       digit4(a)

   elif (num == 5):

       digit5(a)

   elif (num == 6):

       digit6(a)

   elif (num == 7):

       digit7(a)

   elif (num == 8):

       digit8(a)

   elif (num == 9):

       digit9(a)

if __name__ == '__main__':

# Define variables

n = str()

esp = str()

a = int()

b = int()

# Enter and validate data

print("Enter two numeric digits separated by space (a = scale and b = number): ")

while True:

 while True:

  n = input()

  if not len(n)==3:

   print("Try again")

  if len(n)==3: break

 esp = n[1:2]

 a = float(n[0:1])

 b = float(n[2:3])

 if not (esp==" "):

  print("Try again")

 else:

  if not (a>=1 and a<=5):

   print("Try again")

  else:

   if not (b>=0 and b<=9):

    print("Try again")

 if esp==" " and a>=1 and a<=5 and b>=0 and b<=9: break

checkDigit(a,b)

To learn more about 7 segment display programs see: https://brainly.in/question/36196263

#SPJ4

let's create a new dictionary called opposites. the keys in the dictionary will be strings each representing a single word, and the values will be strings representing the opposite of the word given by the key.

Answers

The code for the new dictionary called opposites is:

the first key/value pair will be "hot"/"cold".

opposites = {

   "hot": "cold",

}

the second key/value pair will be "push"/"pull".

opposites = {

   "hot": "cold",

   "push": "pull",

}

the third key/value pair will be "up"/"down".

opposites = {

   "hot": "cold",

   "push": "pull",

   "up": "down"

}

the fourth key/value pair will be "inside"/"outside".

opposites = {

   "hot": "cold",

   "push": "pull",

   "up": "down",

   "inside": "outside"

}

Code Explanation:

   Create a dictionary called opposites.    Add the first key/value pair to the dictionary.    Add the second key/value pair to the dictionary.    Add the third key/value pair to the dictionary.    Add the fourth key/value pair to the dictionary.

Learn more about programming :

https://brainly.com/question/18900609

#SPJ4

telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. which of the following is an acceptable alternative to telnet?

Answers

Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. However, an acceptable alternative to telnet is: C. SSH.

What is telnet?

Telnet can be defined as a standard networking protocol which provides a command line interface (CLI) that is designed and developed to enable its end users virtually access a computer and create a bidirectional text-based (plaintext) communication with a remote network device such as a router.

What is SSH?

SSH is an abbreviation for secure shell and it can be defined as a network protocol that gives an administrator a secure way to access data over an unsecured network.

In this context, we can reasonably infer and logically deduce that secure shell (SSH) is an acceptable alternative to telnet.

Read more on SSH here: brainly.com/question/17147683

#SPJ1

Complete Question:

Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. which of the following is an acceptable alternative to telnet?

SSL

TLS

SSH

NAC

Which line of code makes the character pointer studentpointer point to the character variable userstudent?

char userStudent = 's';
char student Pointer;

a. user Student = studentPointer;
b. studentPointer = &user Student
c. studentPointer = &user Student:
d. user Student = 'studentPointer;

Answers

The correct answer is the option c. studentPointer = &user Student;

The address of another memory cell can be stored in a pointer, which is a special memory location. Pointer could therefore be a pointer that only points to locations that contain characters. Characters are stored in contiguous memory locations using character

A data type called a string is used to store an array's series of characters. In C, a pointer to a string can point to the array's first character, which is the array's starting address. In C, a string's final character is always a null character (\0), signifying that the string has ended.

The starting address of the array, or the first character in the array, can be referred to using a pointer to string.

The character stored at the location can be determined by dereferenceing these pointers using the asterisk * operator. The storage of multiple strings is possible with both pointer variables and 2D arrays.

To learn more about Pointers click here:

brainly.com/question/29063518

#SPJ4

Write an if/else statement to express the following real life situation. Mary likes ice cream and always chooses chocolate unless there is no chocolate in which case she chooses strawberry. But if there’s no strawberry either then she settles for vanilla, which, for some reason, is always available.

Answers

The if/then statement is given as follows:

"If there is chocolate, then Mary chooses chocolate. If there is no chocolate, then she chooses strawberry. Else if there is no strawberry, she chooses vanilla.

What is an If/Then Statement?

Conditionals are programming language instructions used to handle judgments in computer science. Conditionals, in particular, conduct various calculations or actions based on whether a boolean condition set by the programmer evaluates to true or false.

A conditional statement (also known as an If-Then Statement) is a statement that begins with a hypothesis and ends with a conclusion. A conditional statement can also be defined as "If this happens, then that will happen." A conditional statement's hypothesis is the first, or "if" element.

Learn more about If/Then statements:
https://brainly.com/question/552464
#SPJ1

Other Questions
Why might Roosevelts fireside chats like the one you listened to be helpful to the average citizen? Write your response below in complete sentences (Short Answer 2-4 sentences) What do you think is the most important reason why Ghana is still a less economically developed country? 4. Describe the medical and social benefits and risks of new technologies such as CT, PET, and MRI. 11. Ryan and Kathy each drew a triangle with an angle of 20 degrees. Under which condition would thetriangles be similar?a) if both are right trianglesc) if the triangles have the same areab) if both are obtuse trianglesd) if the triangles have the same perimeter (b) Work out y when C = 88 and x = 0.5 Un vendeur travaille dans un supermarch.O TrueO False select the single best answer. halogens are not the only atoms or groups that can be replaced by nucleophilic aromatic substitution as the following reaction shows. h512p601 what is the leaving group in this reaction? (formal charges have been intentionally omitted.) h512p60c h512p60b h512p60a I WILL NAME YOU THE BRAINLIEST IF YOU PLEASE HELP ME!solve the system by graphing. y = x + 22x - y = -1 Which of the following need to be combined in order to achieve integration of all aspects of acting?-directing ability-vocal and physical skill-believability-inner truth Please help! I dont understand and this is due asap!I need help from 39-53!! A train left Sheffield station at 6.30 am andarrived at Tiverton station at 11.00 am.The train travelled 243 miles in total.What was the average speed of the train inmiles per hour (mph)?If your answer is a decimal, give it to 1 d.p. Which relationship has a zero slope? A two column table with five rows. The first column, x, has the entries, negative 3, negative 1, 1, 3. The second column, y, has the entries, 2, 2, 2, 2. A two column table with five rows. The first column, x, has the entries, negative 3, negative 1, 1, 3. The second column, y, has the entries, 3, 1, negative 1, negative 3. A coordinate plane with a straight line starting at (negative 5, negative 5) and passing through the origin, and ending at (5, 5) A coordinate plane with a straight line starting iat (negative 2, 5) and passing the x-axis at (negative 2, 0), and ending at (negative 2, 5). how does the metaphor in line 5 affect the poem's meaning? responses it helps readers to better imagine the motionlessness of the moon in contrast to the movement of the dune grass. it helps readers to better imagine the motionlessness of the moon in contrast to the movement of the dune grass. it allows readers to understand that the speaker is viewing an artistic representation of the moon, not the real moon. it allows readers to understand that the speaker is viewing an artistic representation of the moon, not the real moon., it demonstrates to readers that the natural world is a place that is unaffected by the people who observe it. it demonstrates to readers that the natural world is a place that is unaffected by the people who observe it., it suggests to readers that the moon, like a sculpture, is meant to be appreciated from afar rather than viewed up close. From "The Tyranny of Things" by Elizabeth MorrisTwo fifteen-year-old girls stood eyeing one another on first acquaintance. Finally one little girl said, "Which do you like best, people or things?" The other little girl said, "Things." They were friends at once.I suppose we all go through a phase when we like things best; and not only like them, but want to possess them under our hand. The passion for accumulation is upon us. We make "collections," we fill our rooms, our walls, our tables, our desks, with things, things, things.Many people never pass out of this phase. They never see a flower without wanting to pick it and put it in a vase, they never enjoy a book without wanting to own it, nor a picture without wanting to hang it on their walls. They keep photographs of all their friends and kodak albums of all the places they visit, they save all their theater programmes and dinner cards, they bring home all their alpenstocks. Their houses are filled with an undigested mass of things, like the terminal moraine where a glacier dumps at length everything it has picked up during its progress through the lands.But to some of us a day comes when we begin to grow weary of things. We realize that we do not possess them; they possess us. Our books are a burden to us, our pictures have destroyed every restful wall-space, our china is a care, our photographs drive us mad, our programmes and alpenstocks fill us with loathing. We feel stifled with the sense of things, and our problem becomes, not how much we can accumulate, but how much we can do without. We send our books to the village library, and our pictures to the college settlement. Such things as we cannot give away, and have not the courage to destroy, we stack in the garret, where they lie huddled in dim and dusty heaps, removed from our sight, to be sure, yet still faintly importunate.Then, as we breathe more freely in the clear space that we have made for ourselves, we grow aware that we must not relax our vigilance, or we shall be once more overwhelmed.For it is an age of things. As I walk through the shops at Christmas time and survey their contents, I find it a most depressing spectacle. All of us have too many things already, and here are more! And everybody is going to send some of them to everybody else! I sympathize with one of my friends, who, at the end of the Christmas festivities, said, "If I see another bit of tissue paper and red ribbon, I shall scream."It extends to all our doings. For every event there is a "souvenir." We cannot go to luncheon and meet our friends but we must receive a token to carry away. Even our children cannot have a birthday party, and play games, and eat good things, and be happy. The host must receive gifts from every little guest, and provide in return some little remembrance for each to take home. Truly, on all sides we are beset, and we go lumbering along through life like a ship encrusted with barnacles, which can never cut the waves clean and sure and swift until she has been scraped bare again. And there seems little hope for us this side our last port.And to think that there was a time when folk had not even that hope! When a mans possessions were burned with him, so that he might, forsooth, have them all about him in the next world! Suffocating thought! To think one could not even then be clear of things, and make at least a fresh start! That must, indeed, have been in the childhood of the race.Which of these examples does Morris use to create a negative impression of accumulating things?Group of answer choicesPassion for accumulation is upon usWe send our books to the village libraryThere is no need to save money for thingsOur pictures have destroyed every restful wall-space Please helppp please help how much for 19.35 to get to 25 ill give brainliest whoever answers first When gasoline is burned in a car engine, ________ energy is converted into _________ energy. All of the following are examples of omega-6 and omega-3 fatty acids EXCEPT: a. linoleic acid. b. linolenic acid. c. lecithin. d. EPA and DHA. wildfires, like the ones seen in california lately, is a density dependent factor. question 6 options: true false When you think about a leader, what words would you use to describe that person?