Answer:
Yes
Explanation:
You can call mobile a computer because it come under one of the categories of the computer.
That category being microcomputers.
Answer:
The correct answer to the following question is option e.) Usenet.
Explanation:
Usenet - it is a collection of the user-submitted messages or notes on the various subject that posted to the servers on the worldwide network. Each of the subject collection of notes is known as newsgroups. There are thousands of the newsgroups which is possible for us to form the new one.
It works like the decentralized computer network which allows us to download our required files. We can also download and access the binary files along with the text post.
- The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
- In this method, the subnetting separates the IP address between host and network addresses.
- The subnet mask covers an IP address with its 32-bit number, thus the term "mask".
Given:
Network IP address
Subnet numbers
Calculating the borrow bits:

a)
Calculating the dotted decimal value for the subnet mask:

b)
The additional bits which will be needed to mask the subnet mask that is = 4.
Learn more: brainly.com/question/2254014
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).
Answer:
Explanation:
The following is written in Python. It takes in a file, it then reads all of the elements in the file and adds them to a list called myList. Then it sorts the list and uses the elements in that list to calculate the median. Once the median is calculated it returns it to the user. The code has been tested and the output can be seen in the image below.
def find_median(file):
file = open(file, 'r')
mylist = []
for number in file:
mylist.append(int(number))
numOfElements = len(mylist)
mylist.sort()
print(mylist)
if numOfElements % 2 == 0:
m1 = numOfElements / 2
m2 = (numOfElements / 2) + 1
m1 = int(m1) - 1
m2 = int(m2) - 1
median = (mylist[m1] + mylist[m2]) / 2
else:
m = (numOfElements + 1) / 2
m = int(m) - 1
median = mylist[m]
return median
print("Median: " + str(find_median('file1.txt')))