1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
10

What are the pros and cons of editorial anonymity in Wikipedia

Computers and Technology
2 answers:
Goshia [24]3 years ago
8 0
Wikipedia isnt a trusted or reliable source, i would recommend sites that end in .com .org or .gov, those are run by companies or by the government and are very reliable.
defon3 years ago
5 0
Pros no one knows who it is that's editting
It's anonymous

Con anyone can write anything they want can not be trusted
You might be interested in
Write the half function. A function call and the functionprototype
EastWind [94]

Answer:

C code for half()

#include<stdio.h>

void half(float *pv);

int main()

{

float value=5.0;  //value is initialized  

printf ("Value before half: %4.1f\n", value); // Prints 5.0

half(&value);  // the function call takes the address of the variable.

printf("Value after half: %4.1f\n", value); // Prints 2.5

}

void half(float *pv) //In function definition pointer pv will hold the address of variable passed.

{

*pv=*pv/2;  //pointer value is accessed through * operator.

}

  • This method is called call-by-reference method.
  • Here when we call a function, we pass the address of the variable instead of passing the value of the variable.
  • The address of “value” is passed from the “half” function within main(), then in called “half” function we store the address in float pointer ‘pv.’ Now inside the half(),  we can manipulate the value pointed by pointer ‘pv’. That will reflect in the main().
  • Inside half() we write *pv=*pv/2, which means the value of variable pointed by ‘pv’ will be the half of its value, so after returning from half function value of variable “value” inside main will be 2.5.

Output:

Output is given as image.

3 0
3 years ago
What is the best way to use a prototype to better understand yolir audience?
9966 [12]
I would say A. Test it and receive feedback
6 0
2 years ago
There are five processes A to E to run. Their burst times are 3,4,5,2 and 3 seconds respectively. Their arrival times are 0,1,5,
Sholpan [36]

Answer:

Explanation:::::::::::::::

3 0
3 years ago
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
3 years ago
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Other questions:
  • Which of these statements is true?
    9·1 answer
  • Opportunity cost is the least desirable alternative given up as a result of a decision.
    6·1 answer
  • You can double-click a window’s title bar to maximize the window. true false
    9·1 answer
  • Today encoding scheme has taken over ascII by what
    5·1 answer
  • _______ data would be useful for creating a report containing last year's revenue, which won't be changing.      A. Integrated B
    12·1 answer
  • Black Ops 3 For Ps4 Players Here
    7·1 answer
  • Care should be taken whenever you post comments or photos to any social media or other websites, because each of these online ac
    8·1 answer
  • If I'm screen sharing and I plug in a HDMI, will it screen share what the HDMI is plugged into, and can you talk at the same tim
    11·1 answer
  • Which domain indicates that a website is sponsored by a university or college?
    12·1 answer
  • Which steps are correct for creating a document from a user-defined template?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!