This is true. In some languages, constructors can be made private to restrict the ways in which objects can be created.
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).
Answer:
a) Yes
b) Yes
c) Yes
d) No
e) Yes
f) No
Explanation:
a) All single-bit errors are caught by Cyclic Redundancy Check (CRC) and it produces 100 % of error detection.
b) All double-bit errors for any reasonably long message are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
c) 5 isolated bit errors are not caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit since CRC may not be able to catch all even numbers of isolated bit errors so it is not even.
It produces nearly 100 % of error detection.
d) All even numbers of isolated bit errors may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
e) All burst errors with burst lengths less than or equal to 32 are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
f) A burst error with burst length greater than 32 may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit.
Cyclic Redundancy Check (CRC) does not detect the length of error burst which is greater than or equal to r bits.
Yes it is D like the other person said
Answer: Mesh
Explanation:
Mesh network is network topology in which network nodes are directly connected with infrastructure nodes in active manner without following any hierarchy. This interconnection is made for continuous transmission of data through the network path.It can work even if any particular connection or node faces fault.
- Z-wave commonly uses mesh topology for connecting the nodes to facilitate the home devices in wireless manner along with hub.
- Zigbee also uses mesh topology for proving services at low cost to homes and other areas in wireless form also having router or hub as the linking device.