1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
8

Discuss briefly four types of websites and the criteria you will use to evaluate the content of a website

Computers and Technology
1 answer:
crimeas [40]3 years ago
7 0

Answer: I would look at who made it, what date it was published, what it is about and if it says .gov, .com or etc.

Explanation:

You might be interested in
According to symbolic interaction theory, the internet has helped to remove:
DanielleElmas [232]

Answer:

According to symbolic  interaction theory, the internet has helped to remove:

(D) Time and space barriers.

Explanation:

  • The symbolic interaction theory is such theory which explains that language and symbols are the means of interaction in the social worlds. This theory tells us about the relationship between people in a society.
  • The option a is not correct as the internet has not remove the subculture rather it has provided safe space to it. Sub-culture refers to a group of special interest like group of a biker. Anyone can create their community on the internet.
  • The option b is also incorrect as internet has not remove interpersonal communication rather it has speed up this communication. It is a type of communication in which people communicate with each other via their expression of feelings, verbal and non-verbal means.
  • The option c is also incorrect as the inappropriate content has removed by internet rather now everyone can create content. But regulations and guidelines are being made. A lot of work has been to be done in this area.
  • The option d is correct as the internet has helped to remove the barriers of time and space. It has made this world a global village now anyone from any part of the world can talk to any person to other part of the world over the internet. They can create communities depending upon their interests. They can do business and many other things.
5 0
3 years ago
Defensive programming is sometimes referred to as _________.
Romashka [77]
Anti-malware and Anti-Virus
6 0
4 years ago
assume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
tino4ka555 [31]

Answer:

Suppose I am Chief information officer of a business firm which provide accounting related services to leading companies and brands. Obviously the data that my organization has excess of is prone to various cyber threats and because even a slight misuse of data will cause huge loss of clients, it is huge responsibility to secure every bit of data from any kind of cyber threat.

Majorly two type of security threats are there :-

External threat:-When threat is caused due to an external factor which is outside organization it is called external threat.                                                                                                                                

Criminal syndicates:- These are group of malicious professional attackers .They carefully chosen targets from which they expect good returns.

State-sponsored actors:-Their main goal is accessing the database of organization and an access to organizations.

Hacktivists:- Generally they carry out a malicious cyber activity to promote either a political agenda, religious belief or a social ideology. There has come many cases where these hackers shuts down websites, either for fun or for some political purpose time to time.

2. Internal threat:-Threats which comes from employees, ex-employees and third parties. It is very easy for someone from inside the organization to steal the data and misuse it.

Some of the methods by which we can make sure that the data of organization is secured are:-

Adopt for Penetration testing tool:- Penetration testing tools check the vulnerabilities or weak areas in the software systems.We can also install IDS (Intrusion Detection System) which will alert us if there is suspicious activity on the network. Further we would have to keep an eye on all the database access activity and usage patterns in real time to ensure that no data leakage is taking place, or there is unauthorized SQL.

Calculate risk scores:- Risk scores calculates the vulnerabilities and gives the extent of severity in the form of a numerical score. This will gives the company a bigger picture of data vulnerability.Security companies like Lucideus provide this service of risk score calculation.

A trained Workforce-Employees in the company would have to trained to recognize common cyber threats .Small mistakes that we all do like opening emails from mysterious senders should not be done. There is need of promoting a security conscious work culture. Further if ex employees leave the company on bad terms ,it may happen that they would misuse the data out of anger.So to make sure that this doesn't happen provide only a limited access to employees so that once they leave their privileges to access data of the organization is denied.

Encrypt Data:-Encryption is a process where data is converted to scrambled code before transmitting it by using special mathematical algorithms. Further decoding of that data can be done only when an authorized user accesses it. This will make sure that data is secured and is accessed only by right users.In current scenario, encryption is one of the most popular and effective data security methods used by organizations.

Cloud-based architectures:- It may sound bizarre but Cloud-based architectures are more disaster-tolerant to protect data.Clouds uses encryption to transmit the data and it is encrypted also when it is idle on the cloud servers.

Explanation:

7 0
3 years ago
Create a function that should simulate a game involving the rolling of a standard six-sided dice between two players. The functi
Law Incorporation [45]

Answer:

import random

def roll_dice(r):

   score1 = 0

   score2 = 0

   for i in range(r):

       for j in range(5):

           score1 += random.randint(1,6)

           score2 += random.randint(1,6)

           

       avg1 = score1/5

       avg2 = score2/5

       

       if avg1 > avg2:

           print("Player1 won the " + str(i+1) + ". round ")

       elif avg1 < avg2:

           print("Player2 won the " + str(i+1) + ". round ")

       else:

           print("Tie")

       

       score1 = 0

       score2 = 0

           

roll_dice(3)

Explanation:

Import the random module

Create a function called roll_dice that takes one parameter r

Initialize two scores as 0 for the players

Create a nested for loop. The outer loop will simulate the rounds and inner loop will simulate the each roll.

Inside the inner loop which iterates five times, generate random numbers for two players and add these numbers to their score.

When the inner loop is done, calculate the average score of the players. If the first average is greater, player1 wins the round. If the second average is greater, player2 wins the round. Otherwise, it is a tie. Also, set the scores to zero so that they start again.

Call the function with parameter 3, simulating 3 rounds

4 0
3 years ago
In a style sheet, what must you use to separate multiple declarations for one selector within a rule?
ExtremeBDS [4]
You must use a semicolon (;)
4 0
3 years ago
Other questions:
  • For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell
    12·1 answer
  • What is a collection?
    5·1 answer
  • Forms are used to a provide a more user-friendly way to work with data in tables
    14·1 answer
  • 1. What is Computer Hardware?
    14·1 answer
  • What is an example of a hard skill?
    12·2 answers
  • What are the nine tasks (steps) you should perform prior to upgrading a computer to windows 7?
    10·1 answer
  • What are non-examples of wage and salary?
    7·1 answer
  • The meaning of docile can be determined by the... context clue. synonym atonym or explanation
    14·2 answers
  • When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
    10·1 answer
  • В.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!