Discovery of any vulnerability in a software program can potentially be sold to the government: True.
<h3>What is vulnerability?</h3>
Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.
This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.
Read more on vulnerability here: brainly.com/question/25813524
#SPJ1
The OSI model layer that provides a user interface in the form of an entry point for software programs to access the network infrastructure is: application layer.
<h3>What is the
OSI model?</h3>
OSI model is an acronym for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems)
<h3>The layers of the
OSI model</h3>
In Computer networking, the seven (7) layers of the OSI model include the following in sequential order;
The uppermost layer of the OSI model which is the "application layer" gives software programs an access to the services that allow internet connection or network infrastructure.
Read more on OSI model here: brainly.com/question/14446612
Every recursive function should have an exit criterion (=handling the base case) to exit the recursion.
Without it, it wil recurse forever, until system resources run out (typically the call stack will overflow and your program will crash).