Answer: Media access control layer (MAC layer)  
Explanation:
  The media access control layer is also known as MAC layer. The main function of the media access control layer is that it is used in the transmission of the data into the frame and perform the error detection and the address recognition which basically govern the accessing to the local area network (LAN) transmission medium. 
 The media access control layer is basically responsible for transmission of the data packets from NIC (Network interface card) to the another channel. 
 
        
             
        
        
        
Answer: Phishing
Explanation:
Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages. 
One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one. 
So Phishing is a for of identity theft.
 
        
             
        
        
        
Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.
In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware. 
Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.
You can learn more about ha-cker attack at
brainly.com/question/14366812
#SPJ4
 
        
             
        
        
        
Answer:
The program in Python is as follows:
apples = int(input("Apples: "))
people = int(input("People: "))
apples%=people
print("Remaining: ",apples)
Explanation:
This gets the number of apples
apples = int(input("Apples: "))
This gets the number of people to share the apple
people = int(input("People: "))
This calculates the remaining apple after sharing the apple evenly
apples%=people
This prints the calculated remainder
print("Remaining: ",apples)