1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
4 years ago
6

_____ crime involves the use of computers and the internet to commit acts against people, property, public order, or morality. v

ictimless network cyber juvenile computer
Computers and Technology
1 answer:
den301095 [7]4 years ago
6 0
Hi,


Answer => Cyber


Good Lessons
You might be interested in
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
Which of the following is an input device on a toaster?
iragen [17]
The electrical outlet
3 0
3 years ago
Read 2 more answers
This standard library function returns a random oating-point number within a specied range of values.
IgorLugansk [536]

Answer:

Uniform

Explanation:

The uniform is a standard library function in python that returns a random floating number withing a specified range of values. Floating numbers which are integer numbers separated by a dot or decimal point from the fractional part. It is part of the random module. it is implemented as

Because it is defined in the random module, random module needs to be imported for uniform to be available for use.

import random

random.uniform(lowest point or highest number, highest point or highest number)

5 0
3 years ago
The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pic
tester [92]

Answer:

The correct approach is "Presence awareness".

Explanation:

  • The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself.
  • With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.
5 0
3 years ago
1. Write a bash script to create 3 files of different size greater than 1700 kb and less than 1800 kb . The 2. Content of the fi
Mazyrski [523]

Answer:

See explaination

Explanation:

Bash Script:

#!/bin/bash

echo "Creating files a.txt, b.txt, c.txt..."

#1

# Create a random number between 1700 to 1800. This is the Kb we are looking for

# And then multiply by 1000 (1Kb = 1000 bytes)

r=$(( ($RANDOM % 100 + 1700) * 1000 ))

# head -c specifies the number of chars to read from the input,

# which is /dev/urandom stream in this case.

# Ideally we should have just used r*1000 to specify number of bytes,

# but since we are pipelining it to base64 to get text chars,

# this conversion will happen in the ratio of 4/3.

head -c $r /dev/urandom | base64 > a.txt

# Hence, we trunctate the file to the exact (random number we generated * 1000) bytes

truncate -s $r a.txt

r=$(( ($RANDOM % 100 + 1700) * 1000 ));

head -c $r /dev/urandom | base64 > b.txt

truncate -s $r b.txt

r=$(( ($RANDOM % 100 + 1700) * 1000 ));

head -c $r /dev/urandom | base64 > c.txt

truncate -s $r c.txt

#3 Use tar command to create all_three.tar from a.txt, b.txt, c.txt

tar -cf all_three.tar a.txt b.txt c.txt

echo $(stat -c "%n: %s" all_three.tar)

#4 Gzip a.txt into a.gz (without deleting the original file) and so on

gzip -c a.txt > a.gz

gzip -c b.txt > b.gz

gzip -c c.txt > c.gz

echo $(stat -c "%n: %s " a.gz b.gz c.gz)

#5 Gzip a.txt, b.txt, c.txt into all_three.gz

gzip -c a.txt b.txt c.txt > all_three.gz

echo $(stat -c "%n: %s" all_three.gz)

#6 Gzip the all_three.tar we created in #3

gzip -c all_three.tar > all_three.tar.gz

echo $(stat -c "%n: %s" all_three.tar.gz)

# Check all files we created with ls command sorted by time in ascending order

ls -ltr a.txt b.txt c.txt all_three.tar a.gz b.gz c.gz all_three.gz all_three.tar.gz

4 0
3 years ago
Other questions:
  • What should you keep in mind when installing hard drives?
    5·1 answer
  • Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
    11·1 answer
  • Why do generated backup scripts usually include backticks around names such as database names and column names?
    5·1 answer
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following commands would be t
    10·1 answer
  • Which of the following is the most effective password?
    15·2 answers
  • Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system,
    11·1 answer
  • David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
    10·1 answer
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • Match the parts of the software applications with what they do.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!