1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
2 years ago
13

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’

re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can't steal user's information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.
Computers and Technology
1 answer:
nata0808 [166]2 years ago
3 0

Answer:

cookies are stored on client side.

A hacker would need access to your computer, either by physically reading the cookie data or by means of cross-site scripting.

Other than that, cookies should not contain passwords or credit card numbers, just things like preferences or session identifiers.

You might be interested in
Who are the founders of Microsoft?
vekshin1

Answer:

Bill Gates, Paul Allen

Explanation:

The two founders of the mega-tech giant are Bill Gates, and Paul Allen. Hope this helps!

8 0
3 years ago
How can you put a logo on html without breaching the copyright, design and patents act
Andrei [34K]
You create your own logo
5 0
3 years ago
If a database was being used to track sales, a customer who buys a lot of items would be a good example of how two tables could
3241004551 [841]

Answer:True

Explanation:

7 0
3 years ago
Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down c
DanielleElmas [232]

Fiber Internet is the wired choice of our present times. It has replaced traditional copper-based facilities.

<h3></h3>

How fiber optics are connected?

  • Fiber to the curb (FTTC) means your fiber connection goes to the nearest pole or utility box—not an actual concrete curb. After that, coaxial cables will send signals from the “curb” to your home. This means your connection is made up of part fiber-optic cables, part copper wires.
  • Twisted pair cabling simply refers to a wiring whereby two conductors that are gotten from a single circuit will be twisted together so that their electromagnetic compatibility can be enhanced.
  • This type of network cable is commonly used to connect office computers to the local network and it is used for Ethernet networks. A circuit is formed from the pair of wires which can be used in the transmission of data.
  • Fiber optic internet is a data connection carried by a cable filled with thin glass or plastic fibers. Data travels through them as beams of light pulsed in a pattern. Fiber optic internet speeds are about 20 times faster than regular cable at 1 Gbps.

To learn more about fiber refer to:

brainly.com/question/21808066

#SPJ4

5 0
1 year ago
Select the correct answer.
Vsevolod [243]

Answer:

A.  inspection

Explanation:

To find - Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?

A.  inspection

B . internal audit

C.  test review

D . walkthrough

Proof -

SQA process - Software Quality Assurance process

The correct option is - A.  inspection

Reason -

Formal review in software testing is a review that characterized by documented procedures and requirements. Inspection is the most documented and formal review technique.

The formality of the process is related to factors such as the maturity of the software development process, any legal or regulatory requirements, or the need for an audit trail.

The formal review follows the formal process which consists of six main phases – Planning phase, Kick-off phase, the preparation phase, review meeting phase, rework phase, and follow-up phase.

3 0
3 years ago
Other questions:
  • To have the most impact when using email, you should structure your messages so that
    5·1 answer
  • After Maya gave her friend the password to a protected website, the friend was able to remember it only long enough to type it i
    6·1 answer
  • 6.   If you enter 234.567 into a cell that is formatted to display 1 decimal place, what is the value stored in the cell?
    15·2 answers
  • A(n) ________ operator, such as the greater than or less than symbol, can be used in a query criterion to limits the results pro
    12·2 answers
  • 1. Accessing calendars, contact information, emails, files and folders, instant messages, presentation, and task lists over the
    7·1 answer
  • Write the definition of a function named averager that receives a double parameter and returns-- as a double -- the average valu
    11·1 answer
  • Name an analog quantity other than temperature and sound
    13·1 answer
  • Enna always says thank you when people give her gifts. She even writes thank-you cards. On holidays, Enna remembers
    9·1 answer
  • Which of the following are disadvantages of networks? Check all of the boxes that apply.
    14·1 answer
  • What is the difference of using Selection Tool and Direct Selection Tool?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!