Answer:
Physics, Quantum Mechanics
Explanation:
Light is a stream of photons with no weight. If you want to dig deeper in this mysterious phenomena, you should study physics and quantum mechanics. Physics takes up things like the theory of relativity, which can be useful in studying spacetime and how light travels through it, and quantum mechanics, being the study of matter in an atomic level, should help you get an understanding on how photons of light travel and why they behave so strangely.
Answer:
Real-time
Explanation:
i am sure because on my test it said corect
Answer:
import math
l = float(input("Enter length in cm: "))
l = l / 100;
print("Entered length is " + str(l) + " meters")
area_square = l * l
print("Area of square is " + str(area_square))
area_circle = math.pi * l/2 * l/2
print("Area of circle is " + str(area_circle))
volume_cube = l * l * l
print("Volume of cube is " + str(volume_cube))
Explanation:
*The code is in Python
Ask the user to enter the length in cm
Convert the length to meters and print it
Calculate the area of the square and print it (Since length is equal to a side, the area is length * length)
Calculate the area of the circle and print it (Since length is equal to the diameter, you need to divide it by two to get the radius. The area is pi * length/2 * length/2)
Calculate the volume of the cube and print it (Since length is equal to a side, the volume is length * length * length)
Answer:
Explanation:
Network Access Control is needed to make sure that only set of verified users access the network.
It makes sure that the users are authenticated and only set of some verified users have access to network.
Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.
Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.
This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.