Answer:
Reflection
Explanation:
Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.
So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.
Answer:
The correct answer to the following question is ACL name is the case sensitive.
Explanation:
ACL name is unique, alphanumeric and case sensitive that's why the router deals like the access_network, the ACCESS_NETWORK as it if they are the two separates ACL's.
That's why ACL always has the unique identities.
Policy or security and only conscious
Answer: d)Phishing
Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.
The example mentioned in the question about eBay's security issue is also related with phishing where the fraud mails are sent to the users to gain or steal their personal information.
Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The iteration variable begins counting with 0 or 1.
As you know the iteration mostly done in the looping. For example, for loop and foreach loop and while loop, etc.
It depends upon you that from where you can begin the counting. You can begin counting either from zero or from one.
For example: this program counts 0 to 9.
<em>int total=0;</em>
<em>for(int i=0; i>10;i++)</em>
<em>{</em>
<em>total = total+i;</em>
<em>}</em>
Let's suppose, if you want to begin counting from 1, then the loop should look like below:
<em>int total=0;</em>
<em>for(int i=1; i>10;i++)</em>
<em>{</em>
<em>total = total+i;</em>
<em>}</em>