1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
5

It's not necessary in a field to have .

Computers and Technology
1 answer:
ozzi3 years ago
6 0

it's not necessary in a field to have .

You might be interested in
_ is the adherence to a personal code of principles.
trapecia [35]

Answer: Ethics

Explanation:

 Ethics is the basic principle for the personal code. The code of the ethics is basically designed for outline the values in the organization with honesty and integrity.

The ethics is basically depend upon the principle of core value of the organization. The code of the ethics basically guide the core value in the organization and breaking the rule of ethics can also cause termination from the organization.

Morality, integrity and honesty are all the sub part of the ethics vale in the organization. Therefore, ethics is the correct option.  

3 0
4 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
PART ONE: For this assignment, create an html page that has a login form. The form should have 3 input elements -- 1. type text
Digiron [165]

Answer:

The following code are in HTML language:

Login_page.html :

<!DOCTYPE html>

<html lang="en">

<head>

<title>Login_Form</title>

<meta charset="UTF-8">

<meta name="viewport" content="width=device-width, initial-scale=1">

<link href="css/style.css" rel="stylesheet">

</head>

<body>

<form action="Login_page.php" method="post">

<table>

<tr>

<td>UserName</td>

<td>

<input type="text" name="username" placeholder="Username"/>

</td>

</tr>

<tr>

<td>Password</td>

<td>

<input type="password" name="password" placeholder="Password"/>

</td>

</tr>

<tr>

<td>

<input type="Submit" name="login" value="submit"/>

</td>

</tr>

</table>

</form>

</body>

</html>  

Explanation:

Here, we have to use the HTML tag, and HEAD tag and the TITLE tag for the title of the page.

Then, we have to create a table for the structure of Form page by using table tag.  

Then, we have to create form by using Form tag

Then, create two text boxes for the username and the password with the use of an input tag.

Then, we have to create a submit button for submitting the following details with the use of an input tag.

3 0
3 years ago
A _____ diagram is used to identify causes to a problem.
erik [133]

Answer:

fishbone

Explanation:

6 0
3 years ago
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash ca
weeeeeb [17]

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

5 0
3 years ago
Other questions:
  • True or False: You should only use your mirrors to see behind you when parallel parking.
    14·2 answers
  • INTRODUCTION TO JAVA​
    8·1 answer
  • Write code that causes a "triangle" of asterisks of size n to be output to the screen. specifically, n lines should be printed o
    10·1 answer
  • What is the difference between a Computer Science and a Compter Engineer major?
    14·1 answer
  • Tahir is setting up a message option before sending an e-mail to a colleague. He goes into the Properties dialog box and chooses
    5·1 answer
  • Memory, as a general construct, is best defined as A) the ability to briefly retain information in the senses. B) the long-term
    12·2 answers
  • A customer wants to migrate to Autonomous Database (ADB) but only allows for a very small window of downtime. Golden Gate was ad
    13·1 answer
  • Sue is installing a printer. What program will she need to get the printer to work with her computer? Specify some functionaliti
    9·1 answer
  • The choice of database does not have any impact on the relevancy of search results?
    13·1 answer
  • The ________ encloses and protects the power supply, motherboard, processor, and memory of a computer. drive bay solid-state sto
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!