Answer:
the visibility persists as long as both A and B exist.
Explanation:
Global visibility basically means that the visibility persists as long as both A and B exist. In programming global visibility signifies that the variable/data in question is visible from any context of the code. Meaning that it can be accessed and manipulated from any part of the code, even from within a function or another document. This makes it very easy to use and structure accordingly.
Answer:d) Mono-alphabetic substitution rules
Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.
Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.
Answer:
yes. the above is correct
Explanation: q posted
Answer:
Client, Server
Explanation:
The web browser acts as a client while the university computer acts as a server.
In a Server-Client model or architecture, the server provide the resources while the client request for the resources.
In this case, the university computer provide the resources that is to be consumed by the web browser after it must have made some request. The resources provided by the server (university computer) is based on the client (web browser) request.
Answer:
When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.
Explanation:
Good luck