To connect 8 LEDs to the shift register, you would need a 74HC595 shift register, eight LEDs, eight 220 ohm resistors, breadboard, and jumper wires. Below are the routines required to implement a running LED:
The following initialization code is used to initialize the 74HC595 shift register and turn off all LEDs. avoid setup The delay time is the time taken for each LED to light up. The delay time can be adjusted to change the speed of the running LED.
The output port of the shift register will drive 8 individual LEDs. Only 1 LED will light up at a time. The running LED will start from the left to the right, and run back from the right to the left, and repeat the sequence.The delay time is the time taken for each LED to light up. The delay time can be adjusted to change the speed of the running LED.
To know more about connect visit:
https://brainly.com/question/32451807
#SPJ11
you can add rounded or _______ edges to the individual letters in wordart.
You can add rounded or beveled edges to the individual letters in WordArt.
You can add rounded or smooth edges to the individual letters in WordArt using the "Format Shape" option. This allows you to customize the appearance of your text to better suit your design needs.
Here are the steps to do so:
1. Open your Word document and click on the "Insert" tab.
2. Click on "WordArt" in the "Text" group and choose a WordArt style.
3. Enter your text in the "Edit WordArt Text" dialog box and click "OK."
4. Select the WordArt object by clicking on it.
5. Click on the "Format" tab under "Drawing Tools."
6. In the "WordArt Styles" group, click on the "Text Effects" button (a small blue "A" icon).
7. Hover over "Bevel" in the dropdown menu to see the available options.
8. Click on your preferred beveled or rounded edge style to apply it to your WordArt text.
Now your individual letters in WordArt will have rounded or beveled edges.
Learn more about Wordart: https://brainly.com/question/938171
#SPJ11
You can add rounded or curved edges to the individual letters in WordArt.
WordArt: WordArt is a feature in Microsoft Office applications that allows you to create stylized text with special effects such as shadows, gradients, and outlines.Rounded or curved edges: One of the effects that you can apply to WordArt is to add rounded or curved edges to the individual letters. This can give your text a more organic or whimsical look and can be a useful design choice for certain projects.Applying rounded or curved edges: To apply rounded or curved edges to the letters in WordArt, you can use the "Format" tab that appears when you select the WordArt object. From there, you can select the "Shape Effects" dropdown and choose "Soft Edges" to apply a rounded edge effect to the letters. You can also choose "Bevel" to apply a curved edge effect.Customizing the effect: You can customize the degree of rounding or curvature by selecting "Soft Edges Options" or "Bevel Options" from the Shape Effects dropdown. This will allow you to adjust the size and shape of the effect to fit your design needs.To know more about Wordart: https://brainly.com/question/938171
#SPJ11
code in c programing
Part2 Exercise: [10 marks] Update the previous example to build a linked list that contains integers as follows: 4 5 1- Use the push function to add (8, 14, 16, 2, 20,45) to the linked list 2- Print t
C program that builds a linked list with the given integers and prints its contents:
c
#include <stdio.h>
#include <stdlib.h>
// Structure for a node
struct Node {
int data;
struct Node* next;
};
// Function to push a new node with given data to the front of the linked list
void push(struct Node** head, int newData) {
// Allocate memory for new node
struct Node* newNode = (struct Node*)malloc(sizeof(struct Node));
// Set data and next pointer for the new node
newNode->data = newData;
newNode->next = (*head);
// Update head to point to the new node
(*head) = newNode;
}
// Function to print the linked list
void printList(struct Node* node) {
while (node != NULL) {
printf("%d ", node->data);
node = node->next;
}
printf("\n");
}
int main() {
// Initialize the head of the linked list
struct Node* head = NULL;
// Add elements to the linked list using push function
push(&head, 45);
push(&head, 20);
push(&head, 2);
push(&head, 16);
push(&head, 14);
push(&head, 8);
// Print the linked list
printf("Linked List: ");
printList(head);
return 0;
}
This program creates a linked list and uses the push function to add the integers (8, 14, 16, 2, 20, 45) to the front of the list. Then, it calls the printList function to print the contents of the linked list.
To know more about C program
https://brainly.com/question/33334224
#SPJ11
a customer has brought a computer in to be repaired. he said he thinks that the sound card has stopped working because no audio is produced when music, video, or dvds are played. which troubleshooting step should you take first? (select two.)
The first troubleshooting step that should be taken is to check the sound settings and ensure that the sound is not muted or turned down low.
This can be done by clicking on the sound icon in the system tray and adjusting the volume levels. The next step would be to check the device manager and ensure that the sound card is recognized and functioning properly. This can be done by right-clicking on the "My Computer" icon and selecting "Properties," then clicking on the "Hardware" tab and selecting "Device Manager."
If the sound card is listed with a yellow exclamation mark, it may need to be updated or reinstalled. If these steps do not resolve the issue, further troubleshooting may be required, such as checking for updated drivers or testing the speakers.
For more such questions on troubleshooting , click on:
https://brainly.com/question/28508198
#SPJ11
Information system using the latest information technology has benefited which modern need?.
Information system using the latest information technology has benefited increased data security.
Give a brief account on data security.Data security is the process of guarding digital data against unwanted access, corruption, and theft across all stages of its life. It is a notion that covers every facet of information security, including the logical security of software programs, administrative and access controls, and the physical security of hardware and storage devices. It also contains the policies and practices of the organization.
Strong data security measures, when correctly executed, will safeguard an organization's information assets from cybercriminal activities but they also guard against insider threats and human mistake, which continue to be among the top causes of data breaches in the present. Data security entails the use of tools and technology that increase an organization's awareness of where its crucial data is located and how it is being used. These solutions ought to be able to implement security measures like encryption, data masking, and redaction of sensitive files, as well as automate reporting to speed up audits and ensure compliance with legal standards.
To know more about, data security, visit :
https://brainly.com/question/14487203
#SPJ1
Which is a screen that shows information from a computer
P1: Write a function called FindPrimes that takes 2 scalars, lowerRange and upperRange, and produces a 1D array called outPrimes1. The function finds all the prime numbers within the range defined by lower Range and upperRange. The output outPrimes1 is a 1D array with all the primes within the specified range. Remember that a prime number is a whole number greater than 1 whose only factors are 1 and itself. The input arguments (lowerRange, upperRange) are two (numeric) scalars. The output argument (outPrimes1) is a 1xm (numeric) array. Restrictions: Do not use the primes() function. Hint: use a for loop to go through the entire range and check if the number is prime or not using the isprime() function. For example: For the given inputs: lowerRange = 2; upperRange= 20; On calling FindPrimes: outPrimes1 Find Primes (lower Range, upperRange) produces, outPrimes1 = 1x8 2 3 5 7 11 13 17 19 In outPrimes1 all the prime numbers contained within the range of lowerRange=2 and upperRange=20 are shown. P2 Complete the function FindPrimes to produce a 1D array called outPrimes2. outPrimes2 is a copy of outPrimes1 but contains only the prime numbers that summed together are less than the highest element of outPrimes 1. The input arguments (lowerRange, totalNumbers) are two (numeric) scalars. The output argument (outPrimes2) is a 1 x n (numeric) array. Restrictions: Do not use the primes() function. Hint: use a while loop to go through the outPrimes1 array and and check if the total sum is lower than the highest primer number in outPrimes1. For example: For the given inputs: lower Range = 2; upperRange=20; On calling FindPrimes: outPrimes2= Find Primes (lower Range, upperRange) produces, outPrimes2 = 1x4 2 3 5 7 The output outPrimes2 only contains the prime numbers 2 3 5 7. The sum of all the prime numbers in outPrimes2 is 17, less than 19, which is the highest prime number in outPrimes1. Function > 1 function [outPrimes1, outPrimes2] = FindPrimes (lower Range, upper Range) %Enter your name and section here 2 3 4 endl Code to call your function > 1 lower Range = 2; 2 upperRange=20; 3 [out Primes1, outPrimes2]=FindPrimes (lower Range, upper Range) Save C Reset MATLAB Documentation C Reset
The function FindPrimes takes two scalar inputs, lowerRange and upperRange, and returns two 1D arrays: outPrimes1 and outPrimes2. The function finds all the prime numbers within the range specified by lowerRange and upperRange.
1. The FindPrimes function first uses a for loop to iterate through the entire range defined by lowerRange and upperRange. Within the loop, each number is checked for primality using the isprime() function. If a number is found to be prime, it is appended to the outPrimes1 array.
2. Once outPrimes1 is populated with all the prime numbers within the range, a while loop is used to iterate through the elements of outPrimes1. The loop checks if the sum of the prime numbers encountered so far is less than the highest prime number in outPrimes1. If the sum is less, the prime number is appended to the outPrimes2 array.
3. Finally, the function returns both outPrimes1 and outPrimes2 as output. outPrimes1 contains all the prime numbers within the specified range, while outPrimes2 contains a subset of prime numbers whose sum is less than the highest prime number in outPrimes1.
4. In the given example, FindPrimes with lowerRange = 2 and upperRange = 20 would produce outPrimes1 = [2, 3, 5, 7, 11, 13, 17, 19] and outPrimes2 = [2, 3, 5, 7]. The sum of the prime numbers in outPrimes2 is 17, which is less than the highest prime number in outPrimes1 (19).
Learn more about for loop here: brainly.com/question/30494342
#SPJ11
The tab currently displayed on the ribbon is called the "current tab".
TRUE OR False?
False, The tab currently displayed on the ribbon is not called the "current tab." Instead, it is often referred to as the "active tab" or "selected tab."
This terminology is commonly used in graphical user interfaces (GUIs) and software applications with a ribbon interface. The active tab represents the tab that is currently open or being viewed, and it typically displays the related commands and options for that particular tab's context or functionality.
In graphical user interfaces (GUIs) and software applications that utilize a ribbon interface, the tab currently displayed on the ribbon is commonly referred to as the "active tab." The active tab represents the currently selected or open tab within the ribbon. It is the tab that is being viewed, and it displays a set of commands, options, or tools related to the specific functionality or context of that tab.
The active tab helps users navigate through different sets of commands and features available in the application. By selecting a specific tab, users can access the corresponding tools and functions associated with that tab's category or purpose.
The active tab can be identified by its visual appearance, such as being highlighted, highlighted with a different color, or having a different visual indicator to indicate that it is currently active or selected. This helps users understand which tab is currently being viewed and which set of commands or options are available to them.
In summary, the tab currently displayed on the ribbon is commonly known as the "active tab." It represents the currently selected or open tab within the ribbon and provides access to the related commands and options for that specific tab's functionality or context.
Learn more about applications here:
https://brainly.com/question/28391321
#SPJ11
2. In many jurisdictions a small deposit is added to containers to encourage people to recycle them. In one particular jurisdiction, containers holding one litre or less have a $0.10 deposit, and containers holding more than one litre have a $0.25 deposit. Write a Python script that reads the number of containers of each size from the user. The script should compute and display the refund that will be received for returning those containers. Format the output so that it includes a dollar sign and displays exactly two decimal places.
Answer:
Here is the Python program:
small_container = int(input("Enter the number of small containers you recycled?"))
large_container = int(input("Enter the number of large containers you recycled?"))
refund = (small_container * 0.10) + (large_container * 0.25)
print("The total refund for returning the containers is $" + "{0:.2f}".format(float(refund)))
Explanation:
The program first prompts the user to enter the number of small containers. The input value is stored in an integer type variable small_container. The input is basically an integer value.
The program then prompts the user to enter the number of large containers. The input value is stored in an integer type variable large_container. The input is basically an integer value.
refund = (small_container * 0.10) + (large_container * 0.25) This statement computers the refund that will be recieved for returning the small and larger containers. The small containers holding one litre or less have a $0.10 deposit so the number of small containers is multiplied by 0.10. The large containers holding more than one litre have a $0.25 deposit so the number of large containers is multiplied by 0.25. Now both of these calculated deposits of containers of each side are added to return the refund that will be received for returning these containers. This whole computation is stored in refund variable.
print("The total refund for returning the containers is $" + "{0:.2f}".format(float(refund))) This print statement displays the refund in the format given in the question. The output includes a $ sign and displays exactly two decimal places by using {0:.2f} where .2f means 2 decimal places after the decimal point. Then the output is represented in floating point number using. format(float) is used to specify the output type as float to display a floating point refund value up to 2 decimal places.
The required code which calculates the amount of refund made by returning the containers written in python 3 goes thus :
small_size = eval(input('Enter number of 1L or less containers to be returned: '))
#prompts user to enter the number of small sized containers to be returned
big_size = eval(input('Enter number of containers greater than 1L to be returned: '))
#prompts user to enter the number of big size containers to be returned
small_refund = (small_size * 0.10)
#calculates the total refund on small sized containers
big_refund = (big_size * 0.25)
# calculates the total refund on big size containers
total_refund = float((small_refund + big_refund))
#calculates the Cummulative total refund
print('Your total refund is $' + '{0:.2f}'.format(total_refund))
#displays the total refund rounded to 2 decimal places.
Learn more :https://brainly.com/question/14353514
Why is this happening when I already uploaded files to my drive?
Answer:
u have to upload it to your drive first
Explanation:
what os the full form of cpu
Answer:
central processing unit
Central processing unit
How to fix "the server requested authentication method unknown to the client [caching_sha2_password]"?
To fix this issue, you can use the couple of options below:
Upgrade the MySQL client libraryChange the authentication methodWhat is the authentication method?"The error 'server requested authentication method unknown to the client' happens when your client application uses an unsupported authentication method.
To fix this, upgrade to the latest MySQL client library that supports caching_sha2_password authentication." Download and install MySQL Connector or client library. Change authentication method if needed. Modify the MySQL server configuration file (my.cnf or my.ini) and add/modify this line under [mysqld]:
Learn more about authentication method from
https://brainly.com/question/13615355
#SPJ4
_____ involves recovering the stored information so that we are consciously aware of it.
a. encoding
b. retrieval
c. storage
d. feedback
The term "retrieval" involves recovering the stored information so that we are consciously aware of it. When someone wants to recall something, it must be retrieved from storage. This process of recovery is known as retrieval.
Retrieval is the second of three processes involved in memory, with the other two being encoding and storage. When we can remember something, it is because the brain has retrieved the memory from storage, made it conscious, and brought it to the forefront of our thoughts. Memory retrieval is the process by which information stored in long-term memory is recovered and brought into consciousness. Retrieval can be more or less successful, depending on a variety of factors. Factors that influence retrieval include the way the information was originally encoded, the amount of time that has passed since it was encoded, the individual's age, and whether the person has experienced any intervening events that may have interfered with retrieval.Memory retrieval is critical to our daily lives because we rely on our ability to recall information. When we are retrieving memories, we are consciously making an effort to bring information that we have previously learned to mind. Memory retrieval can be facilitated by the use of cues, which are stimuli that aid recall. Retrieval is an active process that involves the brain's attention and energy. Therefore, Option B is the answer.
In conclusion, retrieval involves recovering the stored information so that we are consciously aware of it.
To learn more about Memory retrieval visit:
brainly.com/question/27282098
#SPJ11
what kind of relationship does a network data model represent? multiple choice one-to-one relationship one-to-many relationship many-to-one relationship many-to-many relationship
A network data model represents a many-to-many relationship.
In a network data model, records can be linked to multiple other records, and multiple records can be linked to one record. This type of relationship is known as a many-to-many relationship. In this model, data is represented in the form of nodes and links. Each node represents a record and links represents the relationships between the records.
Match the categories in the first column with examples in the second column.
1. System unit
hard disk drive
2. Storage
Bluetooth headset
3. Peripheral devices
RAM
Answer:
1 system unit is hard disk drive
2 storage is RAM
3. peripheral devices is Bluetooth headset
ill give brainliest whoever does this fsteset.
an array has been created which stores names. write an algorithm which saves each name on a new line in a text file called student.txt.
names["jane", "Humayun" , "Cora" , " Astrid" , "Goran"]
The algorithm which saves each name on a new line in a text file called student.txt is given as follows:
names = ["jane", "Humayun", "Cora", "Astrid", "Goran"]
with open("student.txt", "w") as file:
for name in names:
file.write(name + "\n")
What is the rationale for the above response?Open the file student.txt in write mode.
Loop through each name in the array names:
a. Write the current name to the file followed by a newline character.
Close the file.
This will create a new text file called student.txt (or overwrite it if it already exists) and write each name from the names array on a new line in the file. The "\n" character at the end of each name ensures that each name is written to a new line in the file.
Learn more about algorithm at:
https://brainly.com/question/22984934
#SPJ1
which of the following is NOT a step to successful collaboration?
Answer: C is correct
Explanation: you should be hearing everyone out, not trying to convince people that you are right.
Activity
1. Create a Virtual Hard Drive a. In Disk Management, click Action in the menu bar and click Create VHD. Follow directions on screen to create the VHD, specifying its location on the hard drive and its size. You can make the size dynamically expanding. The VHD is listed as a Disk in the Disk Management window.
b. Right-click the new disk and click Initialize Disk. Use the GPT/MBR partitioning system for the disk.
3. To format the disk, right-click the unallocated space on the disk and click New Simple Volume. Activity 2. Research
a. What are two uses of a VHD, in which a VHD offers advantages over using a physical hard drive?
b. What is a VHDX? How does it differs from a VHD? You need to substantially increase the available space for a heavily used folder. How do you go about it? You need to substantially increase the available space for a heavily used folder. How do you go about it?
Create a Virtual Hard Drivea. In Disk Management, click on Action in the menu bar and click on Create VHD. Follow the instructions on the screen to create the VHD, specifying its location on the hard drive and its size.
You can make the size dynamically expanding. The VHD is listed as a Disk in the Disk Management window.b. Right-click the new disk and click Initialize Disk. which is a hypervisor-based virtualization system. The VHDX supports up to 64 TB, whereas the VHD format supports up to 2 TB.
The VHDX has an updated storage allocation system, enhanced metadata allocation system, and improved data protection. You can substantially increase the available space for a heavily used folder in two You can expand the virtual hard drive dynamically when it's in use. Use Disk Management to add another virtual hard drive and mount it to a folder in the heavily used folder.
To know more about VHD visit:
https://brainly.com/question/31646235
#SPJ11
(01.04 LC) A friend posts a message about a group who is hacking into people's online banking accounts. What should a responsible social media user do before sharing the post? (5 points) a Assume it is true b Assume it is a lie c Determine whether or not the story is true d Determine if the post will attract attention
The responsibility of the social media user before sharing a post is to determine whether or not the story is true. Thus, option C is correct.
What is social media?Social Media is internet based platform that allows the users to communicate, have conversation globally to any person, share their thoughts, views on a global level.
When a post by friend is noticed regarding the hacking of people's online banking account, the social media user should not share the post to any other user globally before determining whether the story and the context of the post is true or not, as it will lead to the development of the spreading of fake and inappropriate content. Thus, option C is correct.
Learn more about social media, here:
https://brainly.com/question/18958181
#SPJ2
the ____ is a collection of linked documents, graphics, and sounds.
The World Wide Web (WWW) is a collection of linked documents, graphics, and sounds that are accessible over the internet. The World Wide Web (WWW) is a system of interlinked hypertext documents accessed through the Internet.
It is a global system of interconnected hypertext documents, which are commonly referred to as web pages.
These web pages are written in HTML (Hypertext Markup Language) and are linked through hyperlinks, allowing users to navigate and access information by simply clicking on the links.
The web also encompasses various media types, such as images, videos, graphics and sounds audio files, making it a rich and diverse platform for sharing and accessing multimedia content from around the world.
To learn more about graphics: https://brainly.com/question/28350999
#SPJ11
Need help with these
Answer:
1. D
2. B
3. D
Explanation:
vnasgbaenVmad7kDg Zg
The champion of change does not necessarily have to the program coordinator. It could be someone who is passionate about the program and is fully committed to keeping it going for the long run. Whoever the program champion is, it should be someone that should have interest in seeing the program through to the end and achieving the long-term outcomes set for the program. I am not sure what you meant by "software" in your post. Can you expand on what you meant by software?
In this context, the software represents the driving force behind the program, the person who actively supports and promotes its goals, and ensures its continued success.
This individual serves as a catalyst for change, inspiring others to get involved and stay committed to the program's objectives.
They act as a motivator, bringing together stakeholders, participants, and resources necessary for the program's long-term sustainability.
The program champion, regardless of their official title or position, is someone who possesses a deep passion and dedication to the program's mission.
They understand the value and importance of the program's outcomes and are personally invested in its success.
This individual not only envisions the long-term impact the program can make but also actively works towards achieving those goals.
Moreover, the program champion serves as a liaison between various stakeholders, effectively communicating the program's vision, benefits, and progress.
They actively engage with participants, community members, funders, and other relevant parties, building strong relationships and collaborations that contribute to the program's longevity.
For more questions on software
https://brainly.com/question/28224061
#SPJ8
if you're not relying on dedicated software to document cmdb information, you can instead do so in a spreadsheet. True or False
In the absence of dedicated software to document CMDB information, a spreadsheet is a suitable alternative. The statement is true.
To do this, simply create a spreadsheet with columns representing various configuration item attributes, and then fill in the rows with the appropriate information for each configuration item.
A CMDB or Configuration Management Database is a database that stores information about the components of an information system and the relationships between them. In order to maintain an accurate and current CMDB, it is critical to maintain an accurate record of configuration items (CIs). It's preferable to utilize software designed for this purpose, however, utilizing a spreadsheet is an option
Learn more about the spreadsheet https://brainly.com/question/8284022
#SPJ11
How do ACLs work on a router?
Answer:
An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.
Explanation:
PLEASE MARK ME AS BRAINLIEST
a file created in ____ is called a document and has a .docx extension.
A file created in Microsoft Word is called a document and has a .docx extension.
What is Microsoft Word?In Computer technology, Microsoft Word can be defined as a word-processing software application that is designed and developed by Microsoft Inc., so as to avail its end users an ability to type, format, adjust and save text-based documents.
Additionally, some of the projects which Microsoft Word would be best used for include the following:
ArticlesReportsBooksIn conclusion, a file that is created by using Microsoft Word always has a .docx extension.
Read more on Microsoft Word here: https://brainly.com/question/30378445
#SPJ4
(WILL MARK BRAINLIEST IF DONE CORRECT!)
Task 2: The Influence of Social Networking on Business
With the help of online resources, identify and briefly describe (in 200 words each) five social networking websites and the features that are useful to business organizations.
Answer:
Social networking sites provide unprecedented opportunities to get the word out about yourself and your business
Explanation:
Which of the following is not one of the challenges posed by international networks, including the Internet? A. Quality of service B. Costs and tariffs C. Security D. Network management E. Differences in Internet protocols
Correct option is A. Quality of service,it is not one of the challenges posed by international networks, including the Internet.
How do international networks not pose a challenge in terms of quality of service?Quality of service (QoS) is not one of the challenges posed by international networks, including the Internet. QoS refers to the ability of a network to deliver reliable and predictable performance, such as low latency, high bandwidth, and minimal packet loss.
While QoS is important in many network environments, it is not typically considered a significant challenge in international networks.
On the other hand, challenges such as costs and tariffs, security, network management, and differences in Internet protocols are commonly encountered in international networks.
International networks often involve complex billing structures, regulatory frameworks, and varying pricing models, which can pose challenges in terms of cost management and tariff negotiations.
Security is a critical concern in international networks due to the diverse range of cyber threats and the need to protect sensitive data during transmission.
Network management becomes challenging due to the physical distance, diverse infrastructure, and varying technical standards across different countries.
Finally, differences in Internet protocols can hinder interoperability and require careful consideration when establishing connections between networks with varying protocols.
Learn more about Quality of service
brainly.com/question/15295852
#SPJ11
Come test out my game and try to beat/get the world record also lave some ideas on wht i could add thank you. dont forget to like and star https://scratch.mit.edu/projects/737934958/
Answer:
Dude this is cool
Explanation:
this is really cool
Should Microsoft bring paid ads to its X-Box gaming space in light of the new activision deal? Is Microsoft moving to slow with it acquisition based strategy and should they look to develop solutions in house?
Key factors to keep in mind when utilizing paid advertisements within the box gaming domain, as well as effective methods for gaining new customers is User Experience.
What is the gaming spaceThe addition of advertisements that require payment within the box gaming world has the potential to adversely affect the user experience. Most gamers usually desire unbroken gaming and might react unfavorably towards advertisements that are intrusive or that cause disruptions.
To increase revenue on the box platform, Microsoft may consider implementing paid advertisements as a form of monetization. By making use of advertising income, there is a potential to acquire additional funds that can be utilized for various endeavors such as enhancing platform development, etc.
Learn more about gaming space from
https://brainly.com/question/24855677
#SPJ4
i need help on what im doing wrong
Answer:
The error is that you're trying to convert a string with letters inside into an int. What happens if a user type in 'a' instead of '1'? 'a' is not a number so the int('a') would fail and give you an error. Make you add a line to check whether the input a number or not.
Explanation:
Change your code to
DEorAP = input("Is it AP or DE?")
if DEorAP.isdigit()
DEorAP = int(DEorAP)
What evolution has cryptography grown since sample passwords? Name 5.
Answer:
Encrypting Company Devices. ...
Securing Email Communications. ...
Protecting Sensitive Company Data. ...
Encrypting Databases. ...
Securing a Website.
Explanation: