1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
5

What is the differences between array and object in javascript?

Computers and Technology
1 answer:
lakkis [162]3 years ago
6 0
Functionally, not a lot. An object is an associative array basically. As objects, they inherit different properties.
You might be interested in
This activity involves the final processing and complete sterilization of the process finish product
antoniya [11.8K]

Answer:

which activity is that am just asking

3 0
3 years ago
A benefit of IPsec is __________.
Montano1993 [528]

Answer:

Option (4) is correct answer

Explanation:

IPsec stands for Internet protocol security. It is a protocol that works between two communication points. It provides integrity, confidentiality and data authentication for any network. It is used for Virtual private network.  There are two types of VPN, From which an organization needs to choose one.

IPsec and OpenSSl in which IPsec VPN uses IP security.

Benefits of this network are as follows--

  • Option 1 states that it works after the transport layer which is true.
  • Option 2 states that when any user leaves the organization they have no need to take back the martial which he had already provided to the organization which is also the benefit of IPsec.
  • Option 3 states that it provides security that is also correct because it is a protocol that is designed to provide security.

Hence option D (all of the above ) are correct.

3 0
3 years ago
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
Downlad the file and write a program named Lab10b_Act2.py that does the following: Opens the CSV file for reading Reads the CSV
a_sh-v [17]
他們會不會是因為這樣就是說他們的問題,他們會會覺得委屈覺得我
5 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
Other questions:
  • In the transactional process model of communication, the meaning of a message resides with the ___________.
    6·1 answer
  • ​open-source software is​ ________.
    11·1 answer
  • Before creating a brief to design a product, what is needed
    8·1 answer
  • What are some disadvantages of using a word processor over a type writer?​
    7·1 answer
  • Choose the answer that best completes the
    8·2 answers
  • This is the area that displays icons representing open applications.
    15·1 answer
  • Who is better, Tom, Ben, Hank, Angela, or Ginger
    12·2 answers
  • What are the two protocols used most often with iot devices? (select two. )
    10·1 answer
  • What virtual, logically defined device operates at the data link layer to pass frames between nodes?
    15·1 answer
  • 18. which of these components is responsible for providing instructions and processing for a computer? a. cpu b. ssd c. ram d. r
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!