1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
9

Should the federal government have bug bounty programs? Why or why not?

Computers and Technology
2 answers:
ratelena [41]3 years ago
5 0
Yes they should
Hope this hkoed
gogolik [260]3 years ago
4 0

I think this question is supposed to be an opinion question but Im not sure

You might be interested in
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
Artemon [7]

Answer:

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Explanation:

6 0
3 years ago
To view a friend's calendar, you must request access.<br> A) True<br> B) False
Anettt [7]

Answer:

True the answer is true

Explanation:

I hope this helps

6 0
3 years ago
Read 2 more answers
What is the term for a web site that uses encryption techniques to protect its data?
vesna_86 [32]
The answer is secure site, I hope it helps.
8 0
3 years ago
Which of the following is not a characteristic of Web 2.0?
Dmitry [639]

Answer:

c. mentorship programs taking place via the internet

Explanation:

The World Wide Web (WWW) was created by Tim Berners-Lee in 1990, which eventually gave rise to the development of Web 2.0 in 1999.

Web 2.0 can be defined as a collection of internet software programs or applications which avails the end users the ability or opportunity to share files and resources, as well as enhance collaboration over the internet.

Basically, it's an evolution from a static worldwide web to a dynamic web that enhanced social media. Some of the examples of social media platforms (web 2.0) are You-Tube, Flickr, Go-ogle maps, Go-ogle docs, Face-book, Twit-ter, Insta-gram etc.

Some of the main characteristics of Web 2.0 are;

I. Social networking.

II. Blogging.

III. Interactive comments being available on many websites.

Also, most software applications developed for Web 2.0 avails its users the ability to synchronize with handheld or mobile devices such as smartphones.

However, mentorship programs taking place via the internet is not a characteristic of Web 2.0 but that of Web 3.0 (e-mentoring).

7 0
3 years ago
a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a
solong [7]

Answer:

where are the step number. I can't find any

6 0
3 years ago
Other questions:
  • What New England industry quickly collapsed with the discovery of oil in Pennsylvania?
    11·2 answers
  • What are some tasks Petroleum Engineers perform?
    5·2 answers
  • Video- sharing sites allow videos to be uploaded in which file format?
    5·2 answers
  • What command will disable dns lookup to prevent the router from attempting to translate incorrectly entered commands as though t
    6·1 answer
  • Name one advantage of modular switches over fixed-configuration switches.
    5·1 answer
  • if image size and resolution are the same, which file format, .jpg, .gif, .or .tiff, will give you the smallest file size?
    8·2 answers
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 the output is
    5·1 answer
  • If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
    9·1 answer
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    9·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!