Answer:
1. - Observer
2. - iterator
3. - strategy
4. - composite
5. - decorator
Explanation:
An object contains other objects (elements) and must give access to them for clients, without exposing its internal structure. This is an observation.
The subject-object can generate events as an iterable (iterator) and could use different strategic algorithms to achieve a task. Class objects can be used to aggregate other class objects.
In python, the decorator function mimics the outer function of a nested function, but still maintains the functionality of the second function
Answer:
A(n) videoconference allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.
Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
Flip bit position 5 to accomplish this. This maps to hex value 0x20, where the least significant bit is assumed to be at position 0.
Example: ascii "A" = 0x41, "a" = 0x61. 0x41 xor 0x61 = 0x20.
You would implement a flip function by XOR'ing the character value with 0x20.
Answer:
a. Checksum
Explanation:
Based on the information provided within the question it can be said that the field that represents this information is called the Checksum. Like mentioned in the question this refers to a value that represents the amount of bits in a certain transmission message. This is done in order to make sure that the amount of bits that were sent match the amount that were received in order to make sure that no data was lost in transit that would cause high-level errors.