1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
4 years ago
14

Outline a scenario in which you might be acting ethically but might still want to remain anonymous while using the Internet. How

might someone learn your identity even if you attempt to remain anonymous?
Computers and Technology
1 answer:
kompoz [17]4 years ago
8 0

Answer:

I would like to stay anonymous while criticizing the current government. As there have been many cases when people who wrote against the government's decisions were caught by the police.

So I would prefer to stay anonymous while commenting on various government policies. My friends would know about it because I share my posts only with them.

The government can know about my identity by ordering the social networking site to reveal it.

You might be interested in
Using the program below, explain what the output will be at LINE A. 1 #include 2#include 3#include 4 5 int value - 128; 6 7 int
slega [8]

Answer:

This is the complete correct program:

#include <stdio.h>

#include<sys/types.h>

#include<unistd.h>

int value = 128;

int main()

{

  pid_t pid;

  pid=fork();

  if (pid==0) /* child process */

  {

  value +=8;

  return 0; }

  else if (pid > 0) {/* parent process */

 wait (NULL);

 printf ("PARENT: value =%d\n" ,value); /* LINEA */

 return 0;

}

}

The output of the LINE A is:

PARENT: value = 128

Explanation:

The fork() function used in the program creates a new process and this process is the child process. The child process is same as the original process having its own address space or memory.

In the child process the value of pid is 0. So the if condition checks if pid==0. Then the child process adds 8 to the value of its variable according to the following statement  

value +=8;

Now the original process has value = 128. In else if part the parents process has the value of pid greater than zero and this portion of the program is of the parent process :

else if (pid > 0)

{ wait (NULL);

printf ("PARENT: value =%d\n" ,value);

return 0; }

So the value 128 is printed at the end in the output.

wait(NULL) is used to wait for the child process to terminate so the parent process waits untill child process completes.

So the conclusion is that even if the value of the variable pid is changed in the child process but it will not affect the value in the variable of the parent process.

5 0
3 years ago
Which was the first computer brought in nepal?<br>​
Natasha_Volkova [10]

Answer:

the first conputer brought in nepal was IBM 1401

3 0
3 years ago
Read 2 more answers
A computer needs both hardware and to be useful
riadik2000 [5.3K]

Answer:

Software? or a person?

5 0
3 years ago
Read 2 more answers
design a combinational circuit for a BCD to seven segment code converter that will input a BCD number and output it on a seven s
Vlad [161]

Answer:

See explaination

See explaination

Explanation:

Binary coded decimal:

Binary coded decimal (BCD) is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base-10) numeral. The four-bit BCD code for any particular single base-10 digit is its representation in binary notation.

Go to attachment for the step by step solution.

5 0
3 years ago
What service determines which resources a user can access along with the operations that a user can perform?.
sweet [91]

The authorization services determine which resources a user can access along with the operations that a user can perform.

<h3>What is authorization service?</h3>

The authorization service makes sure the user has permission to access a certain resource. Role-based access control (RBAC) and list-based access control are two methods for authorizing (LBAC).

The process of granting anyone permission to use a resource is called authorization.

The description may sound bizarre, but there are numerous actual examples that may help you comprehend what authorization means and how to utilize it with computer systems.

Thus, the authorization services determine which resources a user can access along with the operations that a user can perform.

Learn more about the authorization services here:

brainly.com/question/10436962

#SPJ4

8 0
2 years ago
Other questions:
  • Match each of the following terms to its function:_________
    13·1 answer
  • Modify the program so that it can do any prescribed number of multiplication operations (at least up to 25 pairs). The program s
    10·1 answer
  • Which of the following operation is not performed by a mouse​
    11·1 answer
  • Which of the following describes the term "false information?"
    5·1 answer
  • Consider a Rational class designed to represent rational numbers as a pair of ints, along with methods reduce (to reduce the rat
    10·1 answer
  • Which spreadsheet toolbar displays options such as Cut and Paste?
    11·2 answers
  • As you are learning a client’s programming needs, you realize the program will require an iteration of tasks, yet there are exce
    13·1 answer
  • What does a GPA show
    14·2 answers
  • LIST THE BEST 10 3D PRINTERS WITH THEIR RESPECTIVE APPS.
    14·1 answer
  • Why does rating an incorrect answer as 1 star raise its score on brainly?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!