Answer:
Explanation:
print(list1)
['C++', 'JAVA', 'ASP.PHP']
[2:-2]
Gets 2 position(C++) to -2 position(ASP.PHP), JAVA is in the Middle
print(list2)
[]
Gets middle of C++(nothing)
print(list3)
['Python', 'JAVA', 'MySQL']
Get first, jump 3, get first...
'get', 'any', 'any', 'get', 'any', 'any', 'get', ...
 
        
             
        
        
        
Answer:
it is called a dotted half note
 
        
                    
             
        
        
        
Answer:NULL Scan
Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ). 
The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.
 
        
             
        
        
        
Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software
        
             
        
        
        
IP addresses provide a unique number for identifying devices that send and receive information on the Internet
-scav