1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
2 years ago
9

Should the federal government have bug bounty programs? Why or why not?

Computers and Technology
2 answers:
ratelena [41]2 years ago
5 0
Yes they should
Hope this hkoed
gogolik [260]2 years ago
4 0

I think this question is supposed to be an opinion question but Im not sure

You might be interested in
Why backup system of data and software is necessary. ​
zavuch27 [327]

Answer:

The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. Primary data failures can be the result of hardware or software failure, data corruption, or a human-caused event, such as a malicious attack (virus or malware), or accidental deletion of data.

7 0
3 years ago
has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
Helga [31]

Yes I've noticed this. Unfortunately it's up to the user (Asker) to report an answer incorrect.

8 0
3 years ago
Read 2 more answers
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
2 years ago
A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
nordsb [41]

Answer:

true

Explanation:

7 0
3 years ago
In the lab, wireshark continued to capture data in the background until the:
Alex17521 [72]
In the lab, Wireshark continued to capture data in the background until the capture process was manually stopped later in the lab.
Wireshark is a packet analysis tools, it gets the information for traffic passing through a specific network node.

5 0
2 years ago
Other questions:
  • What is the lucky 3 digit today
    12·1 answer
  • Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
    7·2 answers
  • En que parte del mall del rio venden tarjetas de google play en cuenca​
    7·1 answer
  • What are rules that enforce basic and fundamental information-based constraints?
    12·1 answer
  • Complete the sentence.
    14·1 answer
  • When planning your website, what is one of the key things you should consider
    12·2 answers
  • Various gabs in the digital divide​
    8·1 answer
  • a farmer cultivates 1/4 of his farm with ground nuts and 2/5 of it with maize what is the total landnarea that is cultivated​
    12·1 answer
  • In a spreadsheet, what is text wrapping used for?
    15·1 answer
  • Which are ways that technology keeps you hooked?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!