1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
5

Online education students need to be taught

Computers and Technology
1 answer:
weeeeeb [17]3 years ago
7 0

Online education is a teaching practice delivered through the internet. The students learning from online platforms must be taught to be ethical.

<h3>What is the importance of ethics and integrity?</h3>

In the online education system, the students should learn to be ethical and integral as it enables the students and their teachers to be creative, free to create ideas, and acknowledge others' work.

Ethics teaches the students to develop their personalities and behavior. Students' integrity allows them to be honest, responsible, and fair towards their work and instructor.

Therefore, option A. online learning students must be taught to be ethical.

Learn more about online learning here:

brainly.com/question/14708323

#SPJ1

You might be interested in
A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
rjkz [21]
False. Just calculate what those five mins mean. And remember in percents so you have to divide by an extra 100

Five-nines or 99.999% availability means 5 minutes, 15 seconds or less of downtime in a year. Or, if you are really ambitious, shoot for six nines or 99.9999% availability, which allows 32 seconds or less downtime per year.
5 0
3 years ago
Match each item with a statement below. a.Authentication b.Brute force attack c.Dictionary attack d.Password e.Shoulder surfing
Lana71 [14]

The steps that ensure that the individual is who he or she claims to be

a. Authentication  

Authentication is a process that provides proof that the user is genuine and not an imposter. It is a way to prove that you are allowed to access a system. Usernames and Passwords have been the default method of authentication. These days though, passwords are not the only authentication mechanism.

A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file

b. Brute force attack  

An automated brute force attack involves repetitive successive attempts of password guesses by using a trial and error approach and hoping to guess the encryption correctly. It is an old attack method, but is still in effect and popular with hackers. It can take minutes to crack or an eternity. Using automated brute force attacks tools and programs, and attacker is able to enter parameters such as password length, character set, pattern, language, and skips for the type of password to be generated

A password attack that compares common dictionary words against those in a stolen password file.

c. Dictionary attack  

A dictionary attack is another common offline password attack that begins with the attacker creating encrypted versions of common dictionary words and then compares these words against those in a stolen password file. This is sometimes very successful because users create passwords that are simple English dictionary words. A variation of such an attack is the hybrid attack.

A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows.

d. Password  

Nowadays, when accessing almost any computer device, systems, or a website, we are typically required to provide information that identifies and proves that we are actually that person. This is done by the use of passwords. Despite passwords being the primary means of authentication, they are no longer considered to be a strong defense against attackers.

Viewing information that is entered by another person

e. Shoulder surfing  

An example of shoulder surfing is observing someone entering a code from a keypad while standing from a short distance. Another good example is a hotel room’s cipher lock. Cipher locks are vulnerable to shoulder surfing. Someone passing by from behind is able to see the buttons being pushed and can easily gain access when you leave.

Grouping individuals and organizations into clusters based on an affiliation  

f. Social networking and not social engineering

The definition above is for social networking and not social engineering. Social networking sites are responsible for facilitating individuals with common interests and beliefs and operates and functions as an online community of users. Anyone on social media is able to read information posted by others. Thus, social networking carries with it cyber risks like personal data being used maliciously.

Redirecting a user to a fictitious website based on a misspelling of the URL  

g. Typo squatting

Also known as URL hijacking, Typosquatting is a questionable type of cybersquatting that targets internet users who type a web address incorrectly. It is the extreme version and similar to phishing. When users make such errors, they may be lead to another alternative site owned by a hacker.

Phishing attack in which the attacker calls the victim on the telephone

h. Vishing  

Instead of using emails or other forms of communication to contact the potential victim, a simple phone call can be used. Known as voice phishing, an attacker calls an unsuspecting victim and pretends to be someone working with the victim’s bank. The attacker lies to the user that his or her credit card has experienced fraudulent activity, instructs the victim to call a specific number and hangs up. Upon calling back, the victim is instructed by automated instructions telling them to enter credit card numbers and other essential details.

A phishing attack that targets wealthy individuals  

i. Whaling

Whaling is a type of spear phishing where instead of targeting the small fish, it targets the “bigger fish” or the wealthy individuals who have larger sums of money in a bank account. By putting every effort on this group, the attacker can invest more time in the attack and achieve major success.

6 0
3 years ago
A rectangular drawing object in which text or graphic images can be inserted and positioned anywhere on a page.
Julli [10]
Its b,because the sentence describes a text box so well,plus im in digital art
6 0
3 years ago
In last week's meeting we discussed long and short term costs associated with build an buy scenarios using a house as an example
dedylja [7]

Answer:

Custom software designs a software package that is targeted to a particular user community and that meets an organization's specific needs. A lot of these things must be taken into account whenever making a "buy vs. create" decision for a custom software.

Purchasing a wrong program may hinder the process for your business while trying to build one can be expensive and time consuming. The study of these two methods should take into account labor costs, long-term and brief-term costs, and infrastructure costs.

The most popular purpose an organization creates or gets a custom product is that it's special to their organization and if the software is designed effectively it will improve the business' productivity and create its own competitiveness edge.

Moreover, creating a custom software requires a great upfront cost and it also takes a long time to build a proper one.

Labor costs for developing a customized product are often greater than purchasing off-the-shelf solution, as the company has to employ a software developer and build an IT team to create and manage the right software.

There would be maintenance costs in the long run but it wouldn't be as enormous as it was in the building and the process of creation. But, the more significant than cost, is the long-term benefit it brings to the business.

A specific application will improve the workflow of the company, allow the company to retain space with the rate and volume expansion, all of which would help bring financial benefits and distinguish the business from other competitors.

4 0
3 years ago
In your own words, explain what it means to “buy low, sell high.”
Georgia [21]

Answer:

Resell value should be high like buying a used car for a low price fixing it a bit and double your money.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Why are open standards important in the data communications industry?
    5·1 answer
  • Which agricultural CTSO has programs for middle-school and high-school students, as well as college students?
    13·2 answers
  • Why transportation RFP is important?​
    14·1 answer
  • You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
    14·1 answer
  • The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchas
    9·1 answer
  • Which of the following sentences is written in a passive voice
    5·2 answers
  • Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
    7·1 answer
  • State the difference between a file and a folder
    7·1 answer
  • Five uses of the start button
    7·1 answer
  • 2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!