<span>The encapsulation unit on the presentation layer of the OSI model is the Data link layer (2).</span>
Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.
Answer:
Inline view.
Explanation:
Inline view:-It is not a real view instead it is a sub-query or a SELECT statement in the FROM clause of the of another select statement.In the query provided we have a sub - query which is displaying category and Average of retail from the books table and this query is present in the FROM clause of other SELECT statement.