Discussion Week 7: Create a Python program that populates an array variable (containing at least five elements) within a loop using input supplied by the user. It should then perform some modification

Discussion Week 7: Create a Python program that populates an array variable (containing at least five elements) within a loop using input supplied by the user. It should then perform some modification to each element of the array using a second loop, and then display the modified array in a third loop. Note that there … Read more

Week 8: Once you have completed your practice final project (if you elected to do so), test your understanding of all the topics in this course by completing and submitting the Python final project p

Week 8:  Once you have completed your practice final project (if you elected to do so), test your understanding of all the topics in this course by completing and submitting the Python final project provided. The Week 8 final project involves creating a Python program that builds on the assignments for Weeks 3 and 4. … Read more

Week 7: Due on Feb 25, 2024 11:59 PM This week’s assignment involves writing a Python program to collect all the data of a road trip and calculate each person’s share of the cost. Prompt the user for

Week 7: Due on Feb 25, 2024 11:59 PM This week’s assignment involves writing a Python program to collect all the data of a road trip and calculate each person’s share of the cost. Prompt the user for each of the following: The number of people on the trip. The number of days of the … Read more

Week 6: Due on Feb 20, 2024 11:59 PM This week’s assignment involves writing a Python program to determine whether a password exactly meets the following requirements for a secure password: the length

Week 6: Due on Feb 20, 2024 11:59 PM This week’s assignment involves writing a Python program to determine whether a password exactly meets the following requirements for a secure password: the length of the password must be greater than some minimum length and less than some maximum. You should decide on the minimum (at … Read more

Quiz: 20 minutes. Thank you 1) Which of the following best describes what the function compute returns? def compute(values): result = 0 for value in values: result = result + value

Quiz: 20 minutes. Thank you  1) Which of the following best describes what the function compute returns? def compute(values):    result = 0    for value in values:        result = result + value    return result a-It returns the largest value in the list values b-It returns the smallest value in the … Read more

Select one of the following discussions: Discussion 1: Your supervisor has asked you to configure a new system using existing configurations. He said to use either an ARM template or a blueprint. Wh

Select one of the following discussions:  Discussion 1:  Your supervisor has asked you to configure a new system using existing configurations. He said to use either an ARM template or a blueprint. What would you suggest and why? When do you think it is appropriate to use an ARM template and when is it not?  Discussion 2:  Your company is deploying 200 sensors in a farm to collect field data that … Read more

Create a Python program that accepts a string as input. It should analyze some characteristic of that string and display the result of that analysis. Some examples arefinding or counting a certain cha

Create a Python program that accepts a string as input. It should analyze some characteristic of that string and display the result of that analysis. Some examples are finding or counting a certain character (such as a letter, space, tab, etc.) in the string. converting the first letter of each word to upper case. string … Read more

After reading the article “Don’t Include Social Engineering in Penetration Tests,” discuss whether social engineering should be included as part of a penetration test. Knowing that the human is the we

After reading the article “Don’t Include Social Engineering in Penetration Tests,” discuss whether social engineering should be included as part of a penetration test. Knowing that the human is the weakest link in the cybersecurity chain, is it ethical as part of the pen test to engage in behavior that the author describes as a … Read more

Week 5: 1. Create a Python program that uses a while loop and prompts the user for a series of inputs. You should use a sentinel value to signal when the loop should terminate. Calculate and display t

Week 5: 1. Create a Python program that uses a while loop and prompts the user for a series of inputs. You should use a sentinel value to signal when the loop should terminate. Calculate and display the sum of the user inputs. Some examples that you might use are the following: Total number of miles … Read more