Forum Replies Created

Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • in reply to: Python Input Output Activities 18th March #7428
    Bob
    Participant

    name = input(“Enter name: “) This code sentence is for entering a name.
    ID = input(“Enter your student ID number: “) This code requires you to enter the ID number (it is recommended to add a limit that you can only enter numbers)
    course = input(“Enter your course number: “) Enter your course name.
    print(name + “‘s ID is” + ID + “\nand is enrolled in “+ course) shows the result.

    in reply to: Operating Systems Intro Types #7105
    Bob
    Participant

    My favorite is the macos system. The reason is that my dad is an Apple fan and our family only has Apple products. This resulted in me having never used Android and Windows. Although it is my favorite system, I think the Apple system is too closed, not open and free enough. Although I don’t need an open system. But it’s sad that many of the features that Android can use are not Apple.

    in reply to: VPN Benefits #7010
    Bob
    Participant

    VPN can protect your private data, encrypt and prevent others from monitoring.
    When I returned to China, I used vpn to use Google products.

    in reply to: Encryption #7006
    Bob
    Participant

    Symmetric encryption means that one key is used for encryption and decryption, while asymmetric encryption means that one key is not used for encryption and decryption.

    in reply to: Online Security #6944
    Bob
    Participant

    Regarding how to ensure the security of bank accounts: First, do not trust information from unofficial sources, and protect your account. Don’t use too simple passwords (and don’t be like my dad without a password). If you’re not sure about the online information, go to the bank counter.

    in reply to: Starter Variables and Constants #6540
    Bob
    Participant

    Constants change variables, and variables get their own results because of constants.
    Java,C,C++,C#,PHP,Python,VB,html,PHP,SQL
    Every programming language has a certain degree of difference, but they all have fluent logic to understand

    in reply to: Top software failures in recent history #6302
    Bob
    Participant

    The British “Guardian” and the US “Washington Post” reported on June 6, 2013 that the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) launched a secret surveillance project code-named “Prism” in 2007. Directly enter the central server of the US Internet company to mine data and collect intelligence. 9 international network giants, including Microsoft, Yahoo, Google, and Apple, are participating.

    in reply to: Approaches to online Learning #6294
    Bob
    Participant

    Through Asynchronous and Synchronous E-Learning, the efficiency of home learning has been increased as much as possible

Viewing 8 posts - 1 through 8 (of 8 total)
Scroll to Top