Suppose a person made a mistake while creating their document. You used the word b. Find and Replace the dialog box "SDAM" instead of "SIMAD" in several places. The fastest way to solve this problem is to: " Use the Find-and-Replace feature" (Option B)fastest.
What is the process of using the Find-and-Replace feature?Find and Replace is a Word tool that allows you to search for and replace text (either a single word, a kind of formatting, or a string of wildcard characters).
To operate this tool, complete these steps:
Choose Home > Replace.In Find what, enter the word or phrase you wish to replace.In Replace with, enter your new text.Replace All to replace all instances of the term or phrase. You may also utilize Discover Next until you discover the one you want to modify, then Replace.Go to More > Match case to narrow your search to upper or lowercase letters. There are several methods to browse via this menu.Learn more about Find-and-Replace:
https://brainly.com/question/1385249
#SPJ1
Your Word Document Requirements
Part 1: Name: your name
Part 2: Data Source: the source of your data (do not copy and paste your data into the Word document)
Part 3: Questions to Answer: the questions your analysis will answer
Part 4: The Plan: the pseudocode outline of your program
Part 5: Plan Feedback from Your Partner: suggestions from your partner
Part 5: Results: copy and pasted results from your data file
Part 6: Interpretation: your interpretation of the results
Part 7: Final Feedback from Your Partner: description of what your partner found interesting
You can use this rubric
to evaluate your project before you submit it.
What to Submit
You will submit each of the following.
A Word document: Organize it as shown below.
Your data file: Saved with a .txt extension
Your program: Saved with a .txt extension since you cannot upload a .py file.
Your results file: Saved with a .txt extension.
Using the knowledge in computational language in python it is possible to write a code that the pseudocode outline of your program;
Writting the code:import sys
import os
def main():
# Check and retrieve command-line arguments
if len(sys.argv) != 3:
print(__doc__)
sys.exit(1) # Return a non-zero value to indicate abnormal termination
fileIn = sys.argv[1]
fileOut = sys.argv[2]
# Verify source file
if not os.path.isfile(fileIn):
print("error: {} does not exist".format(fileIn))
sys.exit(1)
# Verify destination file
if os.path.isfile(fileOut):
print("{} exists. Override (y/n)?".format(fileOut))
reply = input().strip().lower()
if reply[0] != 'y':
sys.exit(1)
# Process the file line-by-line
with open(fileIn, 'r') as fpIn, open(fileOut, 'w') as fpOut:
lineNumber = 0
for line in fpIn:
lineNumber += 1
line = line.rstrip() # Strip trailing spaces and newline
fpOut.write("{}: {}\n".format(lineNumber, line))
# Need \n, which will be translated to platform-dependent newline
print("Number of lines: {}\n".format(lineNumber))
if __name__ == '__main__':
main()
See more about python at brainly.com/question/12975450
#SPJ1
When a person’s personal information is collected by other parties, it refers to the issue of_______.
Answer:
The answer should be privacy
Explanation:
Answer: it refers to the issue of version control privacy personality so
The answer should be privacy
Explanation:
you want to identify all devices on a network along with a list of open ports on those devices. you want the results displayed in a graphical diagram. which tool should you use?
Since you want to identify all devices on a network along with a list of open ports on those devices. you want the results displayed in a graphical diagram. the tool that you use is Port scanner.
Why would someone use a port scanner?Finding open ports on a network that might be receiving or transferring data is a process called port scanning. In order to find vulnerabilities, it also entails sending packets to particular ports on a host and examining the answers.
Note that Only when used with a residential home network or when specifically approved by the destination host and/or network are network probing or port scanning tools allowed. Any kind of unauthorized port scanning is absolutely forbidden.
Learn more about Port scanner from
https://brainly.com/question/28147402
#SPJ1