Answer:
phones = {'John': '1234567', 'Julie' : '7777777'}
Explanation:
In the code given in the question phones dictionary contains contains two keys John and Julie and have the values '5555555' and '7777777' respectively. Now in the code the key John in the dictionary phones is assigned the value '1234567' .So the value corresponding to the key John becomes '1234567'.
Answer and explanation : The TCP/IP means TRANSMISSION CONTROL PROTOCOL AND INTERNET PROTOCOL It governs all the communication which are performed over network it has a set of protocol. It defines how different types of conversation are performed without any fault through a network
THERE ARE 5 TYPES OF LAYER IN TCP/IP MODEL
- APPLICATION LAYER: It is present at upper level it is used for high level products for the network communication
- TRANSPORT LAYER: This layer is used for transfering the message from one end to other end
- NETWORK LAYER : Routers are present in network layer which are are responsible for data transmission
- DATALINK LAYER : it is used when there is any problem in physical layer for correcting this datalink are used
- PHYSICAL LAYER: Physical; layer are responsible for codding purpose which we used in communication process
Answer:
the answer is
c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).