Answer:
D. End-User Programmer.
Explanation:
A stack data structure is used to holds data for programs. The first data to go into a stack is always the last to be extracted (First-in-Last-out). Data is read into the stack with the push function and retrieved with the pop function.
When the stack is empty, it means there are no data left to pop from it. If a pop function is issued at this time, the program conventionally throws an error, there is no need for the end-user to write an exception handler for it because the end-user programmer has done that already.
A student is curious about how a Web site appears on his computer screen. There is a communication between the client and the server in the Application Layer.
Explanation:
- When we choose to open a webpage (in any browser) the seventh layer of the OSI model - called Application layer will help to do that.
- What happens after we write the webpage address in address bar is that the Application layer protocol (also called HTTP) formats and sends the request from the client's browser (Internet Explorer, Mozilla Firefox , Opera, Safari etc.) to the server.
- It also formats and sends the server's respond back to client's browser. This process happens very fast and all the OSI model layers are processing in it (not only the Application layer).
- All the layers are working together and each of them is responsible for some particular job, but all together they work as one. The layers communicate with each other and in case of error they will retry and fix the error or if they are unable to do it, the responsible layer will inform the user about the source of the problem.
- What happens when page is requested and received? If we will remove the graphical and visual image and look at the process that computer does. We will see a set of commands, mathematical algorithms, symbols, letters and not understandable codes and processes.
- When data is sent from "A" to "B", a transport layer is responsible to send and deliver it correctly and exactly the same, what was requested.
- If the request, processed by "A" (sender) is too long, the transport layer will divide it in segments (called segmentation process) to understand well and not make a mistake while sending the data to "B" (recipient). After this process data is travelling through the network to the "B" (recipient), if the sent data is segmented or divided, the transport layer is responsible for reassemble it again and "B" (recipient) receives its requested data (It can be web page or other data).
- If the transport layer will not do the segmentation process, then the next - network layer - will check the data and if the requested message is too long it will fragment it (called fragmentation process) and will provide the same as transport layer had to do.
- All the layers processes are connected to each other and work cooperatively.
Answer: Provided in the explanation section
Explanation:
Provided below is the program to carry out this task, i hope you can follow it clearly.
Program is run below
class Car:
def __init__(self, model, make):
self.__year_model = model
self.__make = make
self.__speed = 0
def accelerate(self):
self.__speed += 5
def brake(self):
self.__speed -= 5
def get_speed(self):
return self.__speed
car = Car("F1", "Ferrari")
for i in range(5):
car.accelerate()
print(car.get_speed())
for i in range(5):
car.brake()
print(car.get_speed())
cheers i hope this helped !!
Answer: A) Direct TTL probes technique
Explanation:Direct TTL probe technique that is technique that is used when the attacker is accessing from any smaller part of IP address that is known as subnet. This technique is successful because it sends the packet to the particular host and time to live(TTL) of the return message is not equal to the packet checking processing, then the IP spoof is present in the packet.
Therefore, the correct option is option(A).