Depending on what kind of security measures are implemented, D would definitely be a contender. However, B is also something to take into consideration. I would answer D.<span />
Answer:
Five provisions of cyber ethics are:
Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.
Yes, you can Microsoft office in a Chromebook.
Which of the following are benefits of designing a scalable system? Choose 3 options.
- ability to maintain a high level of service for customers ✔
system will never need to grow again
- Ability to respond to user volume issues more quickly ✔
- guaranteed system access for all users ✔
users may never know that a site has experienced tremendous growth