Answer:
The Proper codes in Line a and Line b is given below
average=Sum/3
print (" Average is = ", average)
Explanation:
In the given question it calculated the sum but the program does not calculate the average of the 3 numbers.The average of the 3 number is calculated by using average=Sum/3 statement so we add this code in Line a then After that print the value of average by using the print function so we add this code in Line b.
== is an operator that returns a boolean if both operand are equal.
1101 * 10 is 11010
11000 + 10 is 11010
11010 == 11010
Thus the output would be True.
Answer:
The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology
, extended analysis of all stages
Explanation:
Solution
Penetration testing has several methodologies which include :OSSTMM and PTES
The comparison between OSSTMM and PTES is stated as follows:
OSSTMM:
Security assessment methodology
More Theoretical
Metrics based
PTES
:
Technology oriented
Penetration testing methodology
Extended analysis of all stages
Now,
There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)
- Pre-engagement Interactions
Now,
The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.
The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.
Six areas are covered by OSSTMM which are:
-
Internet technology security
Answer:
c.
Explanation:
I believe that in this scenario, the best option for this data would be a hash table using open addressing with 1,800 entries. Hash tables consume more memory than lists but it makes up for it with much faster response time speeds. This is because hash tables work on a key:value system therefore, the license plate can easily be grabbed from the database extremely quickly by just plugging in the plate number. Doing so will retrieve all of the saved information from that license plate. That is why hash tables have a constant time complexity of O(1)
The telecommunications device that is widely used in industries that require closed communication are walkie-talkies. Correct answer: D
Walkie-talkies are hand-held, portable, two-way radio transceivers which enable secure communication between the two points, without being part of a network.