Hey there! Hello!
For this question, I'm not sure if you have multiple choice answers; if you do and my answer doesn't really fit into any of them, let me know and we'll take it from there.
Putting anything on the internet can pretty much guarantee that it will stay on the internet forever. Someone, whether it be someone who saved/screenshot your post or the service that controls the posts of the website saving a copy of it and all other posts, it's impossible to get rid of all remnants of a post once you have posted it. Think of all the people who may have reblogged/retweeted/re-whatevered a post on a service that supports it, too.
Most social networks put in their Terms and Conditions that they are allowed to see any and all of what anyone posts or sends to someone through their service. If you DM your significant other a picture of you that you wouldn't want your mom to see, the social service then has the right to view and save information related to the post for quality/functionality/ whatever other reasons. Social services usually have the right to save copies of any information you give to them, whether it be your name/email address or a credit card, for advertising/other purposes.
Also keep in mind that caches exist. The entire purpose of Google Cache is to dig up HTML's from old websites that don't exist anymore for the purposes of allowing someone to view their beauty once more.
Point is, you can burn papers and the information that they held, as long as it wasn't copies and distributed, will be gone. But it's not exactly possible to burn deep-rooted information in the internet's servers that may not be accessible to you once you have deleted your copy of it, but very much accessible to anyone with the expertise to dig it out.
Hope this helped you out! Feel free to ask any additional questions if you have any. :-)
Answer:
The description including its scenario is listed throughout the explanation section below.
Explanation:
Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.
Throughout this configuration or setup:
- Each common network setups network unit, such as a firewall, switch, as well as computer.
- The main network computer serves as either a server as well as the peripheral system serves as just a client.
Answer:
d. .
Explanation:
Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.
While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.
Answer:
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.
Explanation:
This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.
Hope this helps!
Answer:
Option (B) is correct answer.
Explanation:
In this whole world, any person needs to do the task because of some profits. If there is a task with more points and if it is easy then it needs to be executed first.
Here in this question, story 2 is an easy task and gives more money, so that is to be executed first. Story 4 also gives more money but it is not easy so no one grantee to complete the task.
Hence option b is the correct answer. while the other option is not because--
- Option "a" states about story 1, which is easy to complete but can not provide any type of value or money. So why anyone complete that task first which does not gives any types of profits.
- Option c states about story 3, which is not easy to complete and also does not give any profits. So do not need to complete that task first which does not provide any profits and also that is difficult.
- Option d states about story 4, which is not easy to complete but gives a lot of points. But there is no grantee that the task can complete in time. so no one needs to complete the risky task in the first order.
Hence the team member needs to execute the task in the following order--
- Story 2
- Story 4
- Story 1 and then
- Story 3