Answer:
True
Explanation:
for loop is used to repeat the process again and again until the condition not failed.
syntax:
for(initialize; condition; increment/decrement)
{
     Statement
} 
But we can omit the initialize or condition or increment/decrement as well
the syntax after omit the initialization,
for( ; condition; increment/decrement)
{
     Statement
} 
The above for loop is valid, it has no error.
Note: don't remove the semicolon.
You can omit the condition and  increment/decrement.
and place the semicolon as it is. If you remove the semicolon, then the compiler show syntax error.
 
        
             
        
        
        
Answer:
One difference between a Simple Gear train with Same Size Gears and Simple Gear Train with Different Size Gears is the that the number of rotations of both shafts in the Simple Gear Train with Same Size Gears is the same the number of rotations of both shafts in the simple Gear Train with Different Size Gears are different
Explanation:
A simple gear train is one in which each shaft has only one shaft, and the motion of one shaft in transmitted to the other when the gears are in contact
 
        
             
        
        
        
Answer:
C. Spoofing.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.
Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.