1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
14

Outline a scenario in which you might be acting ethically but might still want to remain anonymous while using the Internet. How

might someone learn your identity even if you attempt to remain anonymous?
Computers and Technology
1 answer:
kompoz [17]3 years ago
8 0

Answer:

I would like to stay anonymous while criticizing the current government. As there have been many cases when people who wrote against the government's decisions were caught by the police.

So I would prefer to stay anonymous while commenting on various government policies. My friends would know about it because I share my posts only with them.

The government can know about my identity by ordering the social networking site to reveal it.

You might be interested in
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
4 years ago
And the Founder/Developer of PHP is ____________.
Bingel [31]

Answer:

b. RasmusLerdorf

Explanation:

RasmusLerdorf is the founder/developer of PHP. He created it in 1994. He is a   Danish national who migrated to Canada in 1980.He implemented PHP to support his personal home page and the language continued to get extended  by adding more and more functionality. The original language parser was redeveloped for version 3 in 1997. The latest release of PHP is 7.x made available since December 2015.

7 0
3 years ago
Which two factors most influenced the growth of the Internet during the 1970s?
eduard

Answer:

The answer is "increase in the power of public universities and increased appreciation for a liberal arts education". DARPA and Russia had nothing to do with this. Yes, the computer hardware improvement led to a growth, but National Science Foundation funding in 1981, and hence this is also not an option. And electrical power supply had nothing to do with this. Hence, the above answer. as the concept of the internet is based on liberal arts of education, to impart practical and intellectual skillsets, and hence to grow the social responsibility among the citizens of the whole world. Also, the power of public universities had a big role to play definitely, and this was confirmed from Pentagon as well then when the question was raised, is this due to the risk of a nuclear attack.

Many people think that the main reason was the nuclear attack threat, but that was not an issue definitely. Actually this was the time of liberalization, and the power of the public universities was increased. Hence, they got the chance to share the information of various sorts with the people, and in the process internet started expanding.

Explanation:

The answer is self explanatory.

8 0
3 years ago
Read 2 more answers
_____ allow you to resize a graphic using the mouse.
timofeeve [1]
Microsoft.././/.//././././././.
5 0
3 years ago
Read 2 more answers
Write a complete c++ program using function and array.​
lana66690 [7]

Answer:

Index Value Hash

0 1 $

1 2 $$

2 3 $$$

3 4 $$$$

4 5 $$$$$

Explanation:

8 0
3 years ago
Other questions:
  • What kind of game was Pole Position?
    14·1 answer
  • When you sort a cell range using a to z or z to a, what is rearranged?
    5·1 answer
  • To delete a database object, right-click the object in the Navigation Pane and then click ____ on the shortcut menu.
    15·1 answer
  • To complete a forensic disk analysis and examination, you need to create a ____.
    12·1 answer
  • Briefly summarize two examples of cybercrime stories.<br> quick pleaseeee
    10·1 answer
  • What was the first e-commerce service?
    10·1 answer
  • #5 Multiple Select Which of the following describes a hardware error? Select 3 options.
    7·2 answers
  • . What is a computer network? *
    9·1 answer
  • What are the services offered by web-based email?​
    12·1 answer
  • How many jobs can you get without a college degree
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!