Answer:
A. grep -E "(John|Bob)" salesemployees.csv
Explanation:
The grep command is used to search text. It searches the given file for lines containing a match to the given strings or words.
How to use Grep Command:
grep 'letter' filename – Search any line that contains word 'letter' in filename on Linux
grep -i 'Alphabet' file1 – A case-insensitive search for the word ‘Alphabet’ in Linux and Unix
grep -R 'root' . – Search all files in the current directory and in all of its subdirectories in Linux for the word ‘root’
Answer:
Python file with appropriate comments given below
Explanation:
#Take the input file name
filename=input('Enter the input file name: ')
#Open the input file
inputFile = open(filename,"r+")
#Define the dictionary.
list={}
#Read and split the file using for loop
for word in inputFile.read().split():
#Check the word to be or not in file.
if word not in list:
list[word] = 1
#increment by 1
else:
list[word] += 1
#Close the file.
inputFile.close();
#print a line
print();
#The word are sorted as per their ASCII value.
fori in sorted(list):
#print the unique words and their
#frequencies in alphabetical order.
print("{0} {1} ".format(i, list[i]));
Answer:
The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology
, extended analysis of all stages
Explanation:
Solution
Penetration testing has several methodologies which include :OSSTMM and PTES
The comparison between OSSTMM and PTES is stated as follows:
OSSTMM:
Security assessment methodology
More Theoretical
Metrics based
PTES
:
Technology oriented
Penetration testing methodology
Extended analysis of all stages
Now,
There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)
- Pre-engagement Interactions
Now,
The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.
The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.
Six areas are covered by OSSTMM which are:
-
Internet technology security
Answer:
This is a multicolinearity problem and the student should determine the variable(s) that cause(s) the problem and remove it.
Explanation:
This information means that there exists a linear combination between the independent variables. The problem might have developed due to multicolinearity producing almost perfectly linearly dependent columns.
This could also be as a results of single matrix created when the student use an incorrect indicator variables and included an additional indicator column which created linearly dependent columns.