Social Icons

Saturday, August 31, 2019

Exercise 22

Write a program in Python, which returns the first word of a given text. Example for the text: t = 'Python is a wonderful programming language', the program must return Python


# define a string s
s = "Learning Python in"

# initialize the first word at empty string

# initialize a counter
i = 0
# search the first space in string
while (s[i] != " "):
    first = first + s[i]
    i = i + 1
print("The first word in the string s is : ", s[:i])

Younes Derfoufi

Friday, August 30, 2019

Google Project Zero's security researchers have detected a highly sophisticated cyber-surveillance campaign that relied on trapped websites and 0-day flaws.
It is heavy. Google has just revealed the details of a particularly sophisticated espionage campaign, which allowed to hack softly iPhone tens of thousands of people. The hacking took place through a "small number of hacked websites" that targeted users in an undifferentiated way for "at least two years". "We estimate that these sites received thousands of visitors each week," said Ian Beer, a member of Google Project Zero and one of the best iPhone hackers, in a series of blog notes that details the technical aspects of these attacks.

Exercise 21

Write a program in Python language, which allows you to count the number of vowels in a given string. Example for the string s = 'anticonstitutionally' the program must return the following message: The string anconstitutionally has 9 vowels.


# program that determines the number of vowels in a string
# define vowels in string  
vowels= {'a','e','y','u','i','o'}
# define string
s = "anticonstitutionally"
# getting the len of string
n = len(s)
# initialize number of vowels
number_vowels = 0
# browse all character of string s
for i in range(0,n):
    if(s[i] in vowels):
        number_vowels = number_vowels + 1
print("The number of vowels in string 's' is : ", number_vowels)
The document scanning application, very famous on Google Play, had integrated a new advertising library that, in reality, contained an encrypted part that could download and install malicious code on the smartphone.
The developers of CamScanner, a very popular application on Android with over 100 million downloads, suddenly lost all their karma. Hitherto adored for the quality of their document scanning application, they are now plague victims. "You can not trust you anymore", "You have failed", "It's disgusting", "I want to be paid back", "CamScanner? Rather CamScammer "... can we read on Twitter.

Thursday, August 29, 2019

Exercise 20 

Write a program in Python language, to exchange the first and last characters of a given string.


# define example of string s
s = ""
# getting the len of string s
n = len(s)
#getting the first and last caracter of string s
first = s[0]
last = s[n-1]
# extracing the sub string by ignoring the first and last character
s1 = s[1:n-1]
# make up the new string by exchanging the first and last character
s2 = last + s1 + first

Younes Derfoufi
The Surface family would have little problems with endurance. In recent weeks, many users complain about the abnormal behavior of the battery of their devices.
It's been a few days now that Microsoft Surface enthusiasts are grumbling on forums and social networks. Many owners of Surface Pro 4, Pro 5, Pro 6 and Laptop 2 are experiencing battery problems with their favorite companions. Sudden discharges in full use, poor charging indications that lead to lower performance (Windows reduces the wings of components when the battery reaches a certain threshold) or significant loss of recharge capacity ... the menu is loaded. Microsoft must redouble its efforts to respond to its consumers on its support channels.

Wednesday, August 28, 2019

Exercise 18 

Write a program in Python that asks the user to enter a string s and return a message indicating whether the string contains the letter 'a' by indicating its position on the string. Example if the user types the string s = 'language' the program returns: The letter 'a' is in position: 1 The letter 'a' is in position: 5


# Ask user to input a string s
s = input("Type a string s : ")

# getting the len of string s
n = len(s)

# Browsing and reading all characters of string s
for i in range(0,n):
    # Try if the browsed character is equal to character 'a'
    if(s[i] == 'a'):
        print("The letter 'a' is at position : ", i , " in the string s")

Younes Derfoufi
Concerns are many about the potential drifts related to artificial intelligence technologies. Bias in the processing of requests, poor security of biometric data, use of data without consent ... The topics are not lacking. To better regulate this sector, the European Commission would be working on a new regulation.

The European Union is already a world pioneer in data protection. It could soon consolidate this status with a new regulation on artificial intelligence. According to the Financial Times, in an article of August 22, 2019, the European Commission is currently working on a bill that would extend the rights of European citizens on their data related to the field of AI.

Tuesday, August 27, 2019

Exercise 19 

Write a program in Python that lists the strings that make up the list l = ["laptop", "iphone", "tablet", "printer", "Ipad"] by indicating the length of each string.


l = ["laptop", "iphone", "tablet", "printer", "Ipad"]
#browse and read all the items in the list l
for x in l:
    print(x, " is in list l, its length is: ", len(x))

Younes Derfoufi

Exercise 17 

Write a program in Python to display for a given string the number of occurrences of each character in the string.
Example for the string s = "" the program must display:
The character: "P" appears once in the string s
The character: "y" appears once in the string s
The character: "t" figure 1 time in the string s
The character: "h" appears once in the string s
The character: "o" appears twice in the string s
The character: "n" appears once in the string s
The character: " . "figure 1 time in the string s
The character:" r "figure 1 time in the string s
The character:" g "figure 1 time in the string s


s = "Python programming"
for x in s:
    print("The number of appearance of the\
    caraceter ", x, " in the chain s is :", s.count(x))

Younes Derfoufi
Data theft is increasing in the health sector, probably to accelerate research and development of new products.
Hospitals and medical research centers are currently among the favorite targets of ransomware writers. Highly publicized, these attacks unfortunately hide a reality no less brutal, that of the looting of health data. According to a recent report by the company FireEye, the main experts in this field are Chinese groups who apparently have been pounding the health sector with diligence and method since at least 2013.

Monday, August 26, 2019

1 - What is Python module ?

A Python module is simply a Python code file that can be called and used without having to copy it. A module can contain functions, classes, variables ... A module allows you to logically organize your Python code. Associating code in a module makes the code easier to understand and use.

Exercise 16 

Write a program in Python language that asks the user to enter a string s and then display him all the characters contained in this string.
Example for s = "Python", the program displays the characters:


First method by using the len() method of the string

# Ask to type a string s
s = input("Type a string s : ")

# getting the len of the string s
n = len(s)
for i in range(0, n):

Second method by accessing directly to the characters of string

# Ask to type a string s
s = input("Type a string s : ")
for x in s:

Younes Derfoufi
Ten tech heavyweights, including Microsoft, Alibaba, Google, Intel and Tencent, announced Wednesday, August 21, 2019 the creation of the Confidential Computing Consortium (CCC), hosted by the Linux Foundation.

Ten tech giants announced Wednesday (August 21st) the formation of the Confidential Computing Consortium (CCC). It includes the Chinese Alibaba, Tencent and Baidu, the US Google Cloud, IBM, Microsoft, Intel and Red Hat, the Swisscom Helvetian and the British ARM.

Sunday, August 25, 2019

Exercise 15 

Write a program in Python language that asks the user to enter an integer n and display it if this number is prime or not.


# Ask to type a value of the integer n
n = int(input("Type a value of the integer n : "))

# use an auxiliary variable j that will count the number of divisors of n
j = 0
for i in range(1, n+1):
    if(n%i == 0):
        j = j + 1
if( j == 2):
    print("The integer ", n , " is a prim number")
    print("The integer ", n , " is not a prim number")

Younes Derfoufi
After Baltimore (Maryland) and Riviera Beach (Florida), Texas is in turn victim of a major cyberattack. In the morning of Friday, 23 government institutions were the target of a ransomware, software that keeps the data and only makes them for ransom.

Launched in February 2019, the Password Checkup application allows users to check whether the credentials and passwords they use are safe, or if they are likely to have been hacked. Barely a month after launch, the official Chrome browser extension has detected many anomalies.

Saturday, August 24, 2019

Exercise 14 

Write a program in Python language that asks the user to enter an integer n and display it if this number is perfect square or not


# Ask to type a value of the integers n
n = int(input("Type a value of the integer  n :  "))
# we can use a compteur j
j = 0
for i in range(0,n):
    if(i**2 == n):
        j = j +1
if(j > 0):
    print("The nteger ", n , " is a perfect square")
    print("The nteger ", n , " is not a perfect square")

Exercise 13 

Write a program in Python language that asks the user to enter two integers a and b and to display the quotient and the remainder of the Euclidean division of a by b.


# Ask to type a value of the integers a and b
a = int(input("Type a value of the integer  a  :  "))
b = int(input("Type a value of the integer  b  :  "))
q = a//b
r = a%b
print("The quotient of euclidean division of a by b is : q = ", q)
print("The remainder of euclidean division of a by b is : r = ", r)
 With "Privacy Sandbox", Google wants to save its advertising business while preserving your privacy
The publisher of Chrome wants to create a technology to make advertising targeting online while protecting the personal data of users. This quest for the Grail is based on a complex set of mathematical techniques.
The giant of Mountain View went in search of the five-legged sheep. In several blog posts, Google gives details of its new concept of "Privacy Sandbox", a set of web technologies capable of delivering to advertisers useful information on the personality of visitors to a site without revealing their identity and their lives private. In other words, the "Privacy Sandbox" will make it possible to know who one is dealing with without having to identify it in a unique way. A subtle nuance that - one suspects - is quite complex to achieve.
Inspired by Russian methods, China spreads false information on Twitter, Facebook and now YouTube, to discredit the Hong Kong pro-democracy movement.
After Twitter and Facebook, YouTube turned off 210 channels after discovering they were "coordinating by uploading videos related to ongoing protests in Hong Kong," Shane Huntley said Thursday, Aug. 22, security analyst within the Google group, which owns the video platform.

Friday, August 23, 2019

Exercise 12 

1) - Write a program in Python that asks the user to enter an integer n and display the multiplication table of that number.
2) - Improve the program so that it displays multiplication tables of all numbers between 1 and 9


1) - 
# Ask to type a value of the integer n
n = int(input("Type a value of the integer n "))
print("The multiplication table of : ", n," is :")
for i in range(1,10):
    print(i , " x ", n, " = ",i*n)
2) -
for n in range(1,10):
    #insert separator
    print("The multiplication table of : ", n," is :")
    for i in range(1,10):
        print(i , " x ", n, " = ",i*n)

Younes Derfoufi

Exercise 11 

Write a program in Python that asks the user to enter an integer n and display all the divisors of that number.


# Ask to type a value of the integer n
n = int(input("Type a value of the integer n "))
# run through all integers lower than n
for i in range(1,n+1):
    # try if i is a divisor of n
        print("the number ",i," is a divisor for the integer ",n)

Younes Derfoufi
Cyber ​​criminals have launched a phishing campaign, also called "phishing" since the end of July. They target individuals within companies through emails to achieve corporate data theft.

A phishing campaign (or "phishing") targeted since the end of July "specific individuals within companies" using Amazon's online hosting service, Amazon Public Cloud Storage, warned Wednesday, August 21 the company Proofpoint computer security system.

Thursday, August 22, 2019

Exercise 10 

Write a program in Python that asks the user to enter the radius of a circle and return the area and perimeter.


# import the pi number from math library
from math import pi
# ask user to type a value of radius
r = int(input("Type a value of radius r: "))
# calculate the perimeter of the circle
perimeter = 2*pi*r
# calculate the area of the circle
area = (pi**2)*(r**2)
print("The perimeter of circle with radius r =",r," is perimeter = ", perimeter)  
print("The area of circle with radius r =",r," is area = ", area)

Younes Derfoufi

Exercise 9 

Write a program in Python that asks the user to enter an integer n and display it the factorial n!


# Ask to type a value of the integer n
n = int(input("Type a value of the integer n "))
# define and initialize an auxiliary integer j
j = 1
for i in range(1,n+1):
    j = j * i 
print("The factorial the integer n is:  n! =  ", j)

Younes Derfoufi

Exercise 8 

Write a program in Python that asks the user to enter an integer n and display the value of the sum 1 + 2 + ... + n = ?


# Ask to type a value of the integer n
n = int(input("Type a value of the integer n "))
# define and initialize an auxiliary integer j
j = 0
for i in range(1,n+1):
    j = j + i 
print("The sum 1 + 2 + 3 + ...+ n = : ", j)

Younes Derfoufi
MEDIA Experienced journalists will select relevant articles, but the bulk of the work will be done by algorithms.
Facebook launches in the online press. The social network confirmed this Tuesday the creation of a space "News", which will offer users the main information of the day.
The platform will draw on the experience of professional journalists to select relevant and reliable articles. Other content will be chosen by algorithms, which will determine and target the interests of Internet users according to their activity on the social network.
Hackers try to trap Internet users with cloned sites. To thwart the scam, it is important to always check the URL of the site you are consulting.
Updated on August 21st:

NordVPN informed us that the fake site that was usurping their identity is no longer active, which is good news. Unfortunately, nothing prevents hackers from using another URL that has not yet been blacklisted. So do not let your guard down.

Wednesday, August 21, 2019

Exercise 7 

Write a program in Python that asks the user to enter 3 numbers x, y, and z and display their maximum.


# Ask to type a values of the numbers a, b, c
a = int(input("Type a value of the number a "))
b = int(input("Type a value of the number b "))
c = int(input("Type a value of the number c "))
# define and initialize the maximum number
max = 0
if(a > b):
    max = a
    max = b
if(max < c):
    max = c
    max = max
print("The maximum of the three numbers a,b and c is : ", max)

Younes Derfoufi
The SSD WD_Black P50 Game Drive with NVMe technology and USB 3.2 2x2 interface is expected to beat record speed records.
Western Digital announces a new line of external hard drives and SSDs for players. The flagship of this WD_Black range is the SSD P50 Game Drive which is the first model with a USB 2.0 Gen 2x2 interface (20 Gbit / s theoretical), twice as fast as the current USB 3.1 Gen 2 interface (10 Gbit / s). Thanks to this interface and NVMe technology, according to the manufacturer, the P50 reaches 2000 MB / s in reading. Western Digital has not yet given any other information on the P50 Game Drive, which will be available in the fourth quarter of 2019, in capacities of 500 GB, 1 TB and 2 TB. The SSD will be delivered with a USB Type-C cable and a USB Type-A cable. It will be guaranteed 5 years.
 In 30 minutes, the Galaxy Note 10+ recovers 66% of autonomy.
In 30 minutes, the Galaxy Note 10+ recovers 66% of autonomy. -
Comes with a 25W charger, the Galaxy Note 10+ is Samsung's first high-end smartphone compatible with ultra-fast charging. Without breaking a record, the mobile becomes the champion of Galaxy.
Just arrived at the writing of, the Samsung Galaxy Note 10+ is already suffering the "torture" of our laboratory. Major promise of this new generation of Samsung smartphones, the arrival of ultra-fast charging. Samsung replaces the 15W charger (USB-A to USB-C) usually used, by a 25W charger (USB-C to USB-C) and even offers an optional impressive charger of 45W.

Tuesday, August 20, 2019

Exercise 6 

Write a program in Python language that asks the user to enter their age and display the message "You're Major!" If the age typed is greater than or equal to 18 and the message "you are under age!" If the typed age is less than 18.


# Ask to type age
age = int(input("Type your age : "))
if(age > 18):
    print("You are major !")
    print("You are minor !")

Younes Derfoufi
Twitter and Facebook may be blocked by the Chinese government, but it obviously does not prevent Beijing to use these networks for propaganda purposes. Chinese authorities have used nearly a thousand Twitter accounts, and to a lesser extent Facebook pages, to discredit and divide pro-democracy protesters in Hong Kong, the two social networks said on Monday.
Twitter suspended 986 accounts, "coordinated as part of a Chinese state-backed operation" to "undermine the legitimacy and political positions" of protesters, says Twitter in a blog post. "We have identified large sets of accounts that behave in a coordinated way to amplify the messages about the Hong Kong protests," said the California group.
Despite US sanctions, Huawei's sales increased by nearly 31% in China.
After announcing HarmonyOS to no longer depend on Android, the Chinese tech giant is working on a mapping software. One more step towards the emancipation of Huawei towards Google and its services.
Despite peaceful relations, the technological and commercial war between the United States and China does not stop. Latest announcement: Huawei is developing its own mapping service.
It was possible to access the contents of the password manager even if a master password was set.
Mozilla recently released Firefox Update 68.0.2. This plugged a flaw that allowed to steal the content of the integrated password manager browser by a simple copy and paste, even if the user has set a master password. All that was needed was to go to the "Options -> Privacy and security" menu, open the "Registered identifiers ..." panel, right click on one of the entries and choose "Copy word from past ". But at no time did the browser request the entry of the master password. Since the update, it is now the case.

Monday, August 19, 2019

Exercise 5 

Write a program in Python language that asks the user to enter their integer number and to display it if this number is even or odd


# Ask to type value of n
n = input("Type value of the integer n : ")
# Convert n to int
n = int(n)
# Try if n is evn 
if(n%2 == 0):
    print("The integer n typed is even ")
    print("The integer n typed is old ")

Younes Derfoufi

Exercise 4 

Write a program in Python language that displays the first 100 integers


for i in range(0,101):
""" this will display at execution the first 100 numbers : 

Younes Derfoufi

Sunday, August 18, 2019

1 - What is comment in Python 

Programming languages ​​provide a notation for inserting comments into the code, that is, text that will be ignored when the program is run. Comments can be used to explain a complicated part of a program, or to put indications in the code, like the source code, the language version...

What is an exception

An exception is an operation performed by an interpreter or compiler when an error is detected during the execution of a program. As a general rule, the execution of the program is interrupted, and a more or less explicit error message is displayed.

Saturday, August 17, 2019

Definition of computer terms beginning with the letter A 


Microsoft's technology to install programs over the Internet that add additional features to your browser (the program you are surfing the Internet with). This technique is sometimes hijacked by spyware writers.

Ad hoc

"Ad Hoc" mode is a mode of operation that allows computers connected directly to a Wi-Fi network card to be connected directly, without the use of third-party hardware such as an Access Point (AP).
Although easily guessed, the date of the next Apple keynote seems more and more certain thanks to a leak in the 7th beta of iOS 13.
Published yesterday, the seventh beta of iOS 13 may reveal the date of the next keynote Apple. Digging through the code for this update, the iHelp BR site has spotted new screenshots seemingly for the configuration menu when you first start an iPhone. The calendar icon replaces the date of September 12, 2018 with that of September 10, 2019.

Exercise 3

Write a program in Python that asks the user to enter two numbers a and b and to display their maximum


a = int(input("Type value of the number a : "))
b = int(input("Type value of the number b : "))

if (a > b):
    print("The maximum of a and b is : a = ",a)
    print("The maximum of a and b is : b = ",b)

Younes Derfoufi

Exercise 2

Write a program in Python that asks the user to enter two numbers a and b and display their sum: a + b.


a = input("Type value of the number a : ")
b = input("Type value of the number b : ")
# Convert string value to integer
a = int(a)
b = int(b)
s = a+b
print("The sum of a and b is  : " , s)

Younes Derfoufi

Friday, August 16, 2019

Exercise 1   Back to the list of exercises

Write a program in Python language that asks the user to enter their name and display their name with a welcome message!


name = input("Type your name : ")
print("Welcome : " , name)

Younes Derfoufi

Note: The exercises are note ranked in order of difficulty !

Python training provided by programmers (les programmeurs)

Python practice : Exercises with solution

Part 1- exercises on strings and lists

Exercise 1 || Solution

Write a program in Python language that asks the user to enter their name and display their name with a welcome message!

Exercise 2 || Solution

Write a program in Python that asks the user to enter two numbers a and b and display their sum: a + b.

1 - The concept of OOP in Python 

Object-oriented programming (OOP) is a type of programming based on the creation of classes and objects via a method called instantiation. A class is a prototype (model) encoded into a programming language whose goal is to create objects with a set of methods and attributes that characterize any object in the class. The attributes are data types (class variables and instance variables) and methods, accessible via point concatenation. In object-oriented programming, the declaration of a class groups together methods and properties (attributes) that are common to a given object. Thus one could say that a class represents a category of objects. It also appears as a factory for creating objects with a set of common attributes and methods.
Microsoft has patched vulnerabilities to create worms on Windows 7, Windows 8 and Windows 10. The publisher has also corrected a 20-year-old loophole to elevate privileges.
Yesterday, on the occasion of its Patch Tuesday, Microsoft released patches to be installed urgently, if it is not already done. Indeed, they clog a series of ultra-critical flaws, particularly affecting the latest versions of the operating system. Two flaws similar to "BlueKeep" have been found by Microsoft security researchers (CVE-2019-1181 and CVE-2019-1182).
To find out if your MacBook is concerned, visit the Apple website.

Recalled for a faulty battery problem, a few thousand 15-inch MacBook Pro (generation mid-2015) are no longer allowed to fly. Airlines are starting to ban the use of the device.
In late June, Apple launched a recall program for its 15-inch MacBook Pro (mid-2015 generation) sold between September 2015 and February 2017. The brand has identified a battery problem that could overheat. The Apple site lets you know if your computer is concerned and ask for a free repair.
This is part of the effort of the social network to facilitate its use to newcomers. They will thus be able to become familiar with their use more quickly.
Twitter continues to simplify its access. The social network announced this August 13 that it will soon be possible to follow specific topics in the same way that we are currently monitoring accounts.

Thursday, August 15, 2019

1 - Define string in Python 

 A string variable in Python is sequence of characters that follow each other and delimited by double or single quotas "..." or '...'. A string which does not contain any characters is called an empty string. 


s1 = "Hello !" 
s2 = 'welcome !' 
print(s1) # this will display : 
Hello print(s2) # this will display : welcome

2 - Access the elements of a string variable 

The brackets can be used to access the string elements.

1 - Define a Python Set 

A set in Python(Python set) is an unordered and unindexed collection.
In Python, sets are written with braces {....}.

Creating a set:

mySet = {"Pen", "Pencil", "Eraser"}
# Poster: {'Eraser', 'Pencil', 'Pen'}


Sets are not ordered, so items will appear in random order.
Microsoft warns against BlueKeep II & III. The publisher considers them "wormable" just like the original BlueKeep vulnerability.
Microsoft announced today that it has fixed two new major security vulnerabilities in the Windows Desktop Services package.

After the TV presenters and even a virtual judge, the Chinese search engine Sogou will propose avatars of authors of novels for audio books, in partnership with Zhangyue Technology.
The audio book market is booming in China. To meet the demand in a qualitative way, the Chinese search engine Sogou (subsidiary of Tencent) wants to apply artificial intelligence techniques. He announced on August 9, at the China Online Literature Conference (COL +), the project of intelligent professional avatar Yanny. It combines speech synthesis, image recognition and predictive capabilities to create realistic avatars.

Wednesday, August 14, 2019

Qualcomm announces this August 14, 2019, its collaboration with Russian telecom operators and the Moscow authorities to develop a 5G millimeter wave network by autumn. It will be the first network using millimeter waves on the European continent.
The first 5G millimeter wave network of the European continent is set to open in the autumn, in the Moscow city of Russia. This is the announcement made by the American company Qualcomm on Tuesday, August 14, 2019, which adds that the project is conducted in partnership with the Department of Information Technology of Moscow and Russian mobile operators.

1 - Define a dictionary in Python 

A dictionary is a Python implementation of a data structure similar to an associative array. A dictionary consists of a collection of key-value pairs. Each key-value pair has the key attached to its associated value. A dictionary can be defined by enclosing braces {} with a list of key-value pairs separated by commas.


dic = {key1: value1, key2: value2, key3: value3, ...}
To access a value from the dictionary, use the name of the dictionary followed by the corresponding key in square brackets:


dic = {key1: value1, key2: value2, key3: value3, ...}
print (dic [key1]) # this will display : value1

Example: Telephone Directory

1 - The For loop in Python ... 

The for loop in Python, allows to execute repeated instructions.


for counter in range(start_counter, end_counter):

Example. display the first 10 numbers

for i in range (1,11):
#prints the first 10 numbers 1, 2, ..., 10


Note that in the loop for i in range(1, n) the last one which is n is not included! This means that the loop stops at order n-1.
Endowed with important privileges of access, the computer pilots are unfortunately not always of a high quality. They are therefore a serious Achilles heel for Windows systems.
To interact with the hardware components to which it has access, the Windows operating system relies on an army of small software very practical: drivers or computer drivers. Unfortunately, these programs can also introduce serious security vulnerabilities, as security researchers at Eclypsium have just shown, at the recent DEF CON conference in Las Vegas.
After earning more than a billion dollars, Tumblr sold for a few million to Wordpress
The publisher of Wordpress has bought the blogging platform for an estimated amount of just over $ 10 million. The fall in value seems strongly linked to the ban on adult content.
Tumblr is still changing owners. The platform that hosts more than 450 million blogs has been sold by operator Verizon Automattic, the publisher of Wordpress, another major player in blogging. If the amount has not been disclosed, it is estimated by the US press between $ 10 and $ 20 million.
Now just scan your fingerprint or unlock to connect to a Google service from the Chrome browser on Android. This method is based on the FIDO2 standard.
The password, this authentication method that we all hate, loses a little more ground on Android. Google has announced that some of its services are now accessible without a password from the Chrome browser on Android. To authenticate, simply scan your fingerprint or perform a screen unlock gesture.

1 - The selective structure If 

This structure is one of the most important in programming. The idea is to say that if such a condition is satisfied then, execute an instruction or a block of instructions that otherwise execute other instructions ...
Take the following example:

Tuesday, August 13, 2019

After several months of rumors, Huawei officially unveiled this Friday, August 9, 2019 its home operating system for smartphones and connected objects. The Chinese telecom giant is taking a step closer to abandoning Android, Google's OS, that it may one day be forced to no longer use because of US sanctions.
Rumors have been running for months on the alternative developed in secret by Huawei in case he could no longer use the operating system of Google, Android, because of US sanctions. The telecom giant finally shot down its cards Friday, August 9, 2019, at the Huawei Developer Conference held in Dongguan (China).
The end of Google Chrome 76's private browsing mode detection has only been temporary. Two new methods to detect the incognito mode of the browser have just been discovered.
By updating its Chrome web browser to version 76, Google hoped to put an end to the detection of private browsing. This questionable practice was used by some websites to prevent their visitors from accessing their content in an unlimited way.

Sunday, August 11, 2019

1 - Define a tuple in Python

A tuple is an orderly and non-modifiable collection (n-tuples in mathematics). In Python, tuples are written with parentheses.

Example. Creating a tuple:

myTtuple = ("Java", "Python", "php")
print (myTuple)
# output: ('Java', 'Python', 'php')

2 - Access to the tuple elements

You can access the elements of a tuple by referring to the index number, enclosed in square brackets:

To improve the Skype translation system, Microsoft uses independent workers. They can, as part of their work, access confidential dialogues.
Imagine that someone teleworking, in their pajamas in front of their computer, could listen to a conversation you had on Skype, or even make fun of it with their friends. This is the situation in which some Microsoft providers may find themselves, reveals this August 7th Motherboard.

The social network would be in negotiation with American media. He would be willing to pay several million dollars per license.
Facebook has approached prestigious media to appear in a future tab News which must leave before the end of the year in the United States. Licenses could be as high as $ 3 million a year and should be for a period of three years. Among the companies contacted, there would be Walt Disney Co.'s ABC News, The Wall Street Journal, The Washington Post and Bloomberg.

Facebook boss Mark Zuckerberg released Wednesday, March 6, 2019 a forum on his social network. He looks back on the group's strategy, which he believes should make a shift toward greater privacy for their users.
It is a long time ago, when Mark Zuckerberg felt that privacy was a "social norm exceeded". Nearly ten years after this media release, Facebook boss took the pen Wednesday, March 6, 2019 to deliver his vision of the future of its social networks. "I imagine that a platform based on secure communications will surpass today's open platforms.Privacy gives users the freedom to be themselves and to join more naturally," said Mark Zuckerberg, in a long text that resembles a half-hearted apology following the Cambridge Analytica scandal that rocked the Internet giant in 2018.

The American start-up Hyp3r, Instagram's advertising partner, has collected and uploaded the location data of millions of social network users. The subsidiary of Facebook, so far spared by the scandals around data protection that splash his group, announced Wednesday to have ended their collaboration.
It was one of the few social networks not yet pinned for poor personal data management. Instagram announced Wednesday, August 7, 2019 has "blocked" one of its advertising partners, the marketing specialist geolocated Hyp3r. What is criticized by the subsidiary of Facebook? The collection of location data and the tracking of millions of users, which would have allowed him to establish a database of profiles to determine the centers of interest and travel of each. The company monitors publications by location to retain potential customers.

Saturday, August 10, 2019

Google extends Google Maps augmented reality navigation mode compatibility. It is now available on more Android smartphones, but also iPhones. This feature called Live View is intended for GPS navigation on foot and allows to see directions directions superimposed on the real world via the smartphone screen.

Amazon Web Service does not intend to rest on its laurels. The leading cloud company has increased the number of ads at Re: Invent 2018, the event for the user and vendor community taking place November 26-30 in Las Vegas. Nothing seems to resist the company which announces new services concerning the databases as well as the races of models of autonomous cars, the blockchain or the machine learning. All while keeping the model that makes the success of the brand: the famous "as a service".

Broadcom announced on August 8 the acquisition of Symantec's enterprise security software for $ 10.7 billion (9.6 billion euros), continuing its series of acquisitions in the software field.
Symantec sells its Broadcom business for $ 10.7 billion Broadcom announced Thursday the acquisition of Symantec's enterprise security software for $ 10.7 billion (9.6 billion euros), continuing its series of acquisitions in the field of software.

Saturday, August 3, 2019

A recent misfortune reminds us to take precautions with their chargers portable devices, especially at night.

If the harmfulness of electromagnetic waves is still debated, in society as in scientific circles, the dangers of electrical devices is not in doubt. In particular, those related to the use of chargers of countless portable devices that now populate our daily lives (smartphones, tablets, computers, etc.), especially when they are left connected for very long hours, unattended.

Friday, August 2, 2019

Apple loses first place in the world rankings after having seen its reserves dwindle from 163 billion in 2017 to 102 billion this year. In comparison, Google's parent company Alphabet holds $ 117 billion in cash.
Alphabet is the new king of cash. The parent company of Google has just dethroned Apple and now displays a treasure of 117 billion dollars in cash - that is to say real money on accounts and not shares, real estate, etc. - against "only" 102 billion for Apple.
Far from being simply ironic, the "only" is explained by the fact that the apple brand still held two years ago not less than 167 billion dollars.
It should be noted, however, that the "overflow" that Apple had accumulated over the years was largely due to the fact that the California company did not repatriate all or part of its profits outside the United States.

Thursday, August 1, 2019

1 - Creating a variable in Python

Unlike other programming languages, Python does not have a command to declare a variable. A variable is created when you assign a value to it.


x = 7
y = "Albert"
print (x)
print (y)
Variables do not have to be declared with a particular type and can even change type after being defined.

Scammers are taking advantage of the popularity of the FaceApp app to spread fake apps under the name of FaceApp Pro.

If you're a fan of social networking, you've surely seen photos of your friends and family aged through a sleight of hand. This is the very popular FaceApp mobile application that makes these images very well faked through the AI. And if you're not on the networks, you may also talk about FaceApp for the concerns it raises about the data collected, all the original or processed images becoming de facto property of the publisher of FaceApp. Anyway, smart guys have seen the good trick to scam people with fake FaceApp Pro apps.

A test preview of Windows 10 released by mistake brings up a completely reorganized Start menu.

Even the older ones sometimes make meatballs. As proof, Microsoft has just released to all members of its program Insider a preview of the next major update of Windows 10, the build 18947, which corresponds to the version 20H1 of the operating system, supposed to be released in the first half (H1) 2020. In fact, instead of being tested by a handful of hand-picked users, it is accessible to all "Insiders" who participate in the evaluation program. Admittedly, this premature diffusion is not catastrophic, but it allows the curious to taste very early in advance some novelties, and even functions that may not be integrated into the final version, as explained by Neowin. a site that closely follows the news of the giant Redmond.

Faster, more convenient and less intensive, Cortana should take the form of a Google Assistant app.

We have known for a few weeks:
faced with competition from Alexa and other Google Assistant, significantly more successful, Microsoft has mourned Cortana in its current form. In fact, instead of being automatically integrated with Windows 10, as was the case since 2014, the intelligent assistant of the firm of Redmond will become a standalone app, that everyone can install or not at will.

It will soon be possible to launch a Windows 10 restore from the cloud, in addition to conventional methods by USB key or recovery disk. The new feature would be being tested in the Build 18950 preview of the OS.

Microsoft will soon allow Windows 10 users to restore their PCs from the Internet. A bit like what can be done under macOS, the option would be much more convenient than traditional DVDs or USB recovery keys. The information leaked via the WalkingCat Twitter account, but has not yet been confirmed by the company.

Google prepares a paid subscription to the Play Store
Inspired by the future Apple Play service, Google is testing a formula giving access to games and apps for 4.99 euros per month.

All the operators and all the publishers know it: the paid subscription is much more lucrative than the sale by the unit. This is especially true for Netflix-like services, which gives unlimited access to a multitude of content for a few euros per month. And what is true for video is also true for games and apps. That's why Google is testing a subscription plan for its Play Store, its virtual store for Android.

Learn Python For Beginners

Category Of Mobile Courses

Actualités (644) Adsense (1) Affiliation (1) Algebraic Topology (2) Algorithmic (1) all-news (30) Android (5) Android App (8) Android app without code (4) Android Apps (256) Android Development (4) Android download (2) Android OS (3) AngularJS (1) Automata theory and formal language (5) Bootstrap CSS (1) C programming (5) Category and Functor (8) CMS (3) Computer Glossary (18) Create Mobile App With Ionic Framework (2) CSS (2) CSS-Cascading-Style-Sheets (4) Developpement Java (13) Differential Geometry (1) Django-Python-Framework (15) dropshiping (26) Earn Money by Internet (4) Emplois (23) Framework php (2) Fraud (2) Github (2) HTML (9) IT News (3) Java For Beginners (10) Javascript (12) Kotlin Programming Language (8) Kotlin For Mobile Android (1) Linux Download (2) Marketing (5) Mobile (3) Mobile Courses (4) Mobile Marketing (4) MoneyGram (1) News (721) Node.js (5) Open Source (1) Photoshop (1) Protect Computer (1) Python (37) Python BeautifulSoup (1) Python For Data Science (2) Python PyQt (13) Python Reference (1) Python Source Code (10) Python-Books (6) Python-DVD-Training (1) Python-Exercises (305) Python-Framework (1) Python-IDE (1) Python-Kivy-Framework (2) Python-Modules (1) Python-pdf (2) Python-pyQt (1) python-temp (3) Référencement (2) Script PHP (2) Security (6) SEO (1) Snipping Tool: Faq (1) Social Networks (1) Source Code (4) Statistics With SPSS (2) Surveillance Software (1) Travail à domicile (6) Tutoriels php en vidéos (2) Tutoriels-MySql (6) tutoriels-php (19) Utilitaires (1) VPS (1) Web Hosting (1) Webcam (1) Webmarketing (11) Western Union (1) Windows 10 (1) Windows 7 (4) Windows 7 Faq (2) Windows 8 (1) Windows Accessories (1) Windows Download (8) Windows Drivers (1) Windows Fonts (1) Windows Power Shell (2) Windows Registry (2) Windows Security (18) Windows Software (2) Windows Spyware (2) Windows utilities (3) Windows Virus (2) Windows Vista (3) Windows Wireless (1) Windows xp (1) Wordpress (1)

Sample text

Sample Text

Blogger Templates