1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
6

As the internet continues to expand and become vital to everyday life, it may become more regulated with rules just like our eve

ryday, real-world laws. of the following choices, which one is a possible netiquette system for the future?
a. all capitals will become the preferred way to write online.
b. the same system will remain in place even as the internet continues its expansion.
c. the government will collect taxes by charging money to view each website.
d. a temporary suspension from ...
Computers and Technology
2 answers:
ololo11 [35]3 years ago
8 0

Answer:

The answer is D.

denis23 [38]3 years ago
5 0
I can't see all of option D, but it is potentially correct. Please tell me what option D is and I will tell you if it is option "B" or option "D."
You might be interested in
What is a back door?
V125BC [204]

Answer:

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Explanation:

3 0
3 years ago
Read 2 more answers
Please help will mark brainiest
frozen [14]
Answer community shares a cloud among organizations with similar computing needs
8 0
4 years ago
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signa
Ber [7]

Answer:

import java.util.regex.*;

import java.util.Scanner;

public class Password

{

  public static void main(String[] args) {

  Scanner input = new Scanner(System.in);

  System.out.println("Please enter the Password. \n");

  String passwordString = input.next();

  System.out.println(passwordCheck(passwordString));

  }

  public static boolean passwordCheck(String password){

  if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){

  return true;

  }

  else{

  return false;

  }

  }

}

Explanation:

The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.

6 0
3 years ago
Each of the following code fragments contains a number of security vulnerabilities. For each fragment, identify these security v
Trava [24]

Answer:

Check the explanation

Explanation:

a)

1) int main(int argc, char *argv){

argv has always been an array of pointer whereby each and every element points to the command line argument that is passed to the program.

int main(int argc, char *argv[]) {

2) passwords = fopen(filePath, "r");

argv[0] always holds the name of the program currently running i.e. itself

So you shouldn't even try not to open a executable file for reading. since doing this will not give error but you won't be able to read the file as it is a binary file.

it is god to always check whether the file was opened successfully or not after opening the file. If file was not opened successfully fopen will return NULL.

passwords = fopen(filePath, "r");

if(passwords == NULL)

{

printf(“\n Unable to open file”);

return -1;

}

3) execl(shellPath, "shell", NULL);

Before making a call to execl you should close the open file

close(passwords);

b)

1) char itemID[9];

After creating a char array one should always initialize the array as it may contain some garbage value.

char itemID[9] = “”;

2) scanf("%d", &unitsOrdered);

Since unitOrdered represents the quantity, it should always be non zero and non negative

c)

1) char fullName[MAX_LEN];

MAX_LEN should not be zero or negative as it used to define the size.

If ( MAX_LEN <=0 )

{

return error;

}

else

{

char fullName[MAX_LEN]

}

2) strcpy(fullName, firstName);

Before using the string functions you're expected to always make sure that the pointer that you are passing to the functions should not be NULL i.e. the pointers should always pass to certain memory location.

if (firstName && lastName)

{

strcpy(fullName, firstName);

strcat(fullName, " ");

strcat(fullName, lastName);

return fullName;

}

else

{

return error;

}

5 0
3 years ago
Without middleware, different bi programs cannot easily connect to the data warehouse. group of answer choices
inna [77]

Without middleware, different BI programs cannot easily connect to the data warehouse: True.

<h3>What is a data warehouse?</h3>

A data warehouse can be defined as a logical collection of information that are gathered or obtained from many different operational databases, in order to both support and enhance day-to-day business analysis activities and decision-making tasks of various employees who are working in a business organization.

This ultimately implies that the primary purpose of a data warehouse is to logically aggregate a collection of information from all the departments in a business organization into a single repository.

However, we can infer and logically deduce that without middleware such as application server, different Business intelligence (BI) programs won't easily connect to the data warehouse.

Read more on data warehouse here: brainly.com/question/18565560

#SPJ1

7 0
2 years ago
Other questions:
  • If you turn your volume to loud on u'r headphones can it break the sound quality of the speaker?
    9·2 answers
  • 12.
    9·1 answer
  • For a horror film, Pauline wants to show a computer-generated monster appearing from the body of an actor. How can she do this?
    8·1 answer
  • After a robbery, what is the purpose of conducting a neighborhood canvass?
    9·1 answer
  • User-system interaction is?
    11·1 answer
  • . If you have written the following source code:
    9·1 answer
  • Write a program that reads a sequence of up to 20 pairs of employee names and IDs. Store the data in an object designed to store
    15·1 answer
  • The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
    12·1 answer
  • A user who enters americanbank.net into a web browser instead of the correct americanbank and is then taken to a fake look-alike
    11·2 answers
  • Access your Practice Lab titles Access your exercise content Reports and files Access your settings Access help and support Comp
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!