1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
9

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int

o the public domain when:
A. the software's programming code is released.
B. the software is widely distributed.
C. hackers are able to break into the source code.
D. the courts become involved.
E. a new version of the software is released.
Computers and Technology
1 answer:
Lubov Fominskaja [6]3 years ago
4 0

Answer:

The answer is "Option B".  

Explanation:

The main drawback of commercial security is, that the software may not protect digital technology against data mining, and they are not known to be the  imperial tools, that's why the only option B is correct, and certain options are wrong, which can be explained as follows:

  • In option A, It used to provide a sequence of instructions, which is used in security.  
  • In option C, It doesn't use in security, that's why it is wrong.
  • Option D and Option E are wrong because in software there is no use of court and new software, it only upgrades the software.
You might be interested in
Computer _____ begins with regular maintenance of the computer system such as firewalls, antivirus programs, defragmentation, de
Dima020 [189]
Computer checkup/maintenance. You forgot to mention windows updates, it is critical to perform that action as well cause of the recent ransomeware malware that is going around lately and Microsoft and other OS vendors yes even Apple have released patches to prevent it spreading even further. 
4 0
3 years ago
Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
user100 [1]

Answer: Option (A) & (D) are correct.

Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.

An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.

7 0
3 years ago
Wich command converts a number to a string​
AfilCa [17]

Answer:

okay yes i agree

Explanation:

8 0
3 years ago
What is an information​ system? A. Information databases B. Information technology C. Hardware and software components D. Comput
Tom [10]

Answer:

Option E Components that interact to produce information

Explanation:

Information system is a system to collect, analyze and disseminate information. An information system consists of five components that work with each other to produce information:

  1. Computer hardware - physical machine that works with information
  2. Computer software - a set of computer instructions that tell computer hardware how to perform a task
  3. Telecommunications - components that connect a group of hardware as to establish a network. This usually includes WiFI technology.
  4. Databases and data warehouses - the place where the digital data are kept and retrieved.
  5. Human resources and procedures - human expertise that run the system by following some standard procedures.
5 0
3 years ago
Write a program that will input a list of test scores in from the keyboard. When the user enters -1, print the average.
aivan3 [116]

Answer: -1 usually represents infinity.

Explanation:

It would keep going forever and not be able to stop without manually stopping it.

3 0
3 years ago
Read 2 more answers
Other questions:
  • __________ involves analyzing a large amount of data to extract knowledge and insight
    13·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • How to get out of compatibility mode in word?
    15·1 answer
  • 350 square feet requires 1 gallon of paint. Assign gallons_paint with the amount of paint required for wall_area. Sample output
    12·1 answer
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • Study the images of two different fronts.
    7·2 answers
  • Which logic correctly describes an algorithm to find the smallest of the three numbers a, b, and c and store the smallest number
    15·1 answer
  • A good CRM should Integrate marketing, sales, and customer support activities measuring and evaluating the process of knowledge
    13·1 answer
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • Select the function of keypunches that were used as one of the earliest input devices. A. It was used to control the cursor on t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!