There are some typos in this question as the numbers become too large and lead to undefined during calculations.
so the correct data is:
Songs = 12
Rock = 15
Blues = 20
Disco = 15
The answer & explanation for this question is given in the attachment below.
Answer:
C. sending emails impersonating legitimate companies in an attempt to learn a recipient's personal information
Answer:
a) Time to live field
b) Destination
c) Yes, they have two ip addresses.
d) 128 bits
e) 32 hexadecimal digits
Explanation:
a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.
b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.
c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.
d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)
e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit
Answer:
The answer to this question is "Password".
Explanation:
In computer science, any User's computer and networks and server is secured with the password to access all we use the password. for example, if we want to access any WiFi system or any User's computer. Then we will insert the password. If the password is wrong so we can't access the WiFi system or User's computer. similarly, If we want to access any server so we must know about the password. Then we use the server and change it's setting.
So the password is the primary means of authentication for all User's.
Which language? In Java it would simply be:
int count;