Answer:
What are the provisions of cyber law in Nepal?
Provision of cyber law of NEPAL
It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).
Hope this helps Have a good day
Answer:
num1 = int(input("Enter value: "))
num2 = int(input("Enter value: "))
if num1 == num2:
print("Equals.")
else:
print("Unequal.")
Explanation:
Answer:
d. This statement results in input failure.
Explanation:
We are taking input of 3 variables only and those are x,ch,and y. cin is a C++ keyword used take input entered by the user onto the screen cin is not a variable.
The input should of type int char int as written in the code. First is x and character variable ch and then the integer variable y and there should be only three inputs.
Clients that run numerous virtual machines.
<h3>What is a virtual machine?</h3>
- A virtual machine is the virtualization or emulation of a computer system in computing.
- The functionality of a physical computer is provided by virtual machines, which are built on computer architectures.
- Their use may necessitate specialized hardware, software, or a combination of both.
- Virtual machines' primary function is the simultaneous operation of several operating systems on a single piece of hardware.
- Without virtualization, running two different physical units would be necessary to run different operating systems, such as Windows and Linux.
- Through the use of virtualization technologies, virtual machines are made possible.
- Multiple virtual machines (VMs) can run on a single machine thanks to virtualization, which simulates virtual hardware using software.
- The real machine is referred to as the host, and any virtual machines running on it as the guests.
To learn more about virtual machines, refer to:
brainly.com/question/27961159
#SPJ4
once you have sent the email it will only go to the server which then the person receiving it would log on therefore requesting the emails recived.
I'm not 100% sure my answer is classed as correct but I would say it doesn't go to a computer it just gets stored on a server in till requested