Forum Replies Created
- AuthorPosts
Bob
Participantname = input(“Enter name: “) This code sentence is for entering a name.
ID = input(“Enter your student ID number: “) This code requires you to enter the ID number (it is recommended to add a limit that you can only enter numbers)
course = input(“Enter your course number: “) Enter your course name.
print(name + “‘s ID is” + ID + “\nand is enrolled in “+ course) shows the result.Bob
ParticipantMy favorite is the macos system. The reason is that my dad is an Apple fan and our family only has Apple products. This resulted in me having never used Android and Windows. Although it is my favorite system, I think the Apple system is too closed, not open and free enough. Although I don’t need an open system. But it’s sad that many of the features that Android can use are not Apple.
Bob
ParticipantVPN can protect your private data, encrypt and prevent others from monitoring.
When I returned to China, I used vpn to use Google products.Bob
ParticipantSymmetric encryption means that one key is used for encryption and decryption, while asymmetric encryption means that one key is not used for encryption and decryption.
Bob
ParticipantRegarding how to ensure the security of bank accounts: First, do not trust information from unofficial sources, and protect your account. Don’t use too simple passwords (and don’t be like my dad without a password). If you’re not sure about the online information, go to the bank counter.
Bob
ParticipantConstants change variables, and variables get their own results because of constants.
Java,C,C++,C#,PHP,Python,VB,html,PHP,SQL
Every programming language has a certain degree of difference, but they all have fluent logic to understandBob
ParticipantThe British “Guardian” and the US “Washington Post” reported on June 6, 2013 that the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) launched a secret surveillance project code-named “Prism” in 2007. Directly enter the central server of the US Internet company to mine data and collect intelligence. 9 international network giants, including Microsoft, Yahoo, Google, and Apple, are participating.
Bob
ParticipantThrough Asynchronous and Synchronous E-Learning, the efficiency of home learning has been increased as much as possible
- AuthorPosts