Answer:D) peek
Explanation:Peek operation or function is the method that is used for the returning of the values on the front of the queue or stack type datatypes. This operation function over those datatypes having group or collection of the elements and does not eliminate any element from the queue.
NOsuchElemnet exception is shown when there is the peek operation in the queue for the element to be displayed on the top and no deletion can take place .Thus, the correct option is option(D).
7 Basic Internal Component found in a computer tower:
1) Power Supply
2) Central Processing Unit (CPU)
3) Hard Disk Drive (HDD)
4) Motherboard
5) Video card
6) Random Access Memory (RAM)
7) Sound Card
*Expansion Card, Network Card, Bluetooth Card
Answer:
numbers = 1:1:100;
for num=numbers
remainder3 = rem(num,3);
remainder5 = rem(num,5);
if remainder3==0
disp("Yee")
else
if remainder3 == 0 && remainder5 == 0
disp ("Yee-Haw")
else
if remainder5==0
disp("Haw")
else
disp("Not a multiple of 5 or 4")
end
end
end
end
Explanation:
- Initialize the numbers variable from 1 to 100.
- Loop through the all the numbers and find their remainders.
- Check if a number is multiple of 5, 3 or both and display the message accordingly.
Before text = indents paragraph to the right
First line = indents the start of a paragraph
Register-true = formats page styles
Line spacing = manages space between two lines
The first line always gets indent to specify that it is a start of the paragraph
Line spacing always focus on the number of spaces between lines. There are various values available to give spacing according to the need. Register- true is used to format all the page styles and do other related configurations.
Answer:
Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.
On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.
This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.