1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
3 years ago
11

Which one of the following is an example of hacktivism according to you and why?

Computers and Technology
1 answer:
Sedaia [141]3 years ago
3 0

Answer:

Group hacks into a government website to protest allowing the construction of multi-storied buildings in urban centers.

Explanation:

Hacktivism refers doing illegal things for social benefits or welfare not for personal benefits.

Here hacks into a government website is an illegal activity and the cause to protest allowing the construction of multi-storied buildings in urban centers purpose social benefits not for any particular person benefit.

There lot of benefits for multi-storied building like Due to Steel, high strength to and large spans.

These buildings are light weight construction.

These buildings are more power reinforced concrete frames

It must implemented construction framework which are typically prefabricated in the factory gives gives lot of potential advantage hacktivism

Since many advantages for society doing illegal activity like hacking but gives positive results. So it is hacktivism.

You might be interested in
What is search engine
koban [17]
Search engine is a software to help find you results over the internet.

Examples of search engines are: Google, Safari, Yahoo etc.
4 0
3 years ago
Read 2 more answers
Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'
lbvjy [14]

Answer:

Check the explanation

Explanation:

Pseudocode For Reading File:

start

Declarations

InputFIle records.txt

OutputFile result.txt

string authorName

string title

int numOfVol

open InputFile

open OutputFile

input authorName, title, numOfVol from records.txt

while not eof

output authorName

output title

output numOfVol

end while

close records.txt

close results.txt

END

The flowchart for reading the file can be seen below.

3 0
3 years ago
For BitTorrent, which of the following is true:
Bumek [7]

Answer:

d. All of the above

Explanation:

All the above mentioned statements are true about BitTorrent.

8 0
3 years ago
Pda bkhhksejc pnwjoynelp dwo xaaj ajykzaz ywj ukq zaykza ep???<br><br><br> The Key Value is 22
Sindrei [870]

Answer:

The following transcript has been encoded can you decode it???

Explanation:

It is a ceasar cipher. Shift every letter in the alphabet by 22 positions.

3 0
3 years ago
Consider the following protocol for concurrency control. The database system assigns each transaction a unique and strictly incr
nasty-shy [4]

Answer:

(a) yes, this protocol allows only serializable schedules for transactions as due to this the system maintains it's consistency. As in this protocol a unique transaction id is being assigned and with the help of that transaction id the system would be able to identify the process which has taken place in what particular order. For example, in case of bank transfers

balance = 1000 transaction id 100

write ADD 200 transaction id 101

write SUB 1100 transaction id 102

write ADD 900 transaction id 103

in here with the help of transaction id we can check which operation has happened in which order, if not then some operation will not happen like 102 immediately after 100 and skipping 101

(b) the modified version of this protocol would be to also consider the time of transaction and take this factor in the consideration

4 0
3 years ago
Other questions:
  • Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he
    14·2 answers
  • Assume that the 100,000 element integer array that you allocated starts at address 0x50000000 in memory, the size of an integer
    6·1 answer
  • Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
    7·1 answer
  • How to stay organized in an online school?
    7·1 answer
  • Interruption attacks are also called ___ attacks:
    8·1 answer
  • Demographics refers to
    7·1 answer
  • 50 POINTS!!!!!!!!!!!<br><br> Give at least two examples of how the transport layer is used.
    13·2 answers
  • What software application is most appropriate to use to create multimedia presentations?
    6·2 answers
  • My game is telling me to "Press any key." Where is the "any" key?????
    13·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!