1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
4 years ago
8

b. Suppose instead that Miller had written a routine to constantly change his assigned IP address to other addresses used by his

ISP. If the SLS intrusion system determined what Miller was doing and then added the entire range of ISP addresses to the banned list, thus stopping any user of the ISP from connecting to the SLS network, would SLS’s action be ethical?
Computers and Technology
1 answer:
amm18124 years ago
5 0

Answer:

It wouldn't be legal practice of SLS’

Explanation:

The Internet service address is the address of the internet where we getting the address of the internet sometimes it is known as the computer address of the host machine.  

Since the miller has changed the Ip address continuously in a constant manner also the other address which is giving by the internet service provider  The transfer of IP address, Miller will be able to receive their network. That sort of practice is not legal of SLS.

You might be interested in
All of the following are types of data storage devices except CD/DVD computer monitor digital cameras flash drive
horrorfan [7]

Computer Monitors are not storage devices.

3 0
3 years ago
(09 MC)How can understanding your own personality improve your relationships with others?
Mars2501 [29]
B.) is what most employers are looking for
5 0
2 years ago
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
ycow [4]

Answer:

A

Explanation:

4 0
3 years ago
20 points!!!!! Help, I am being timed!!!!!!!
jarptica [38.1K]

Answer: XML files that contain the code that to be inserted, elements that control its behaviour and metadata such as the author's name.

Explanation:

3 0
2 years ago
. In Laissez-faire Styleof Group Leadership, Members of the group are not given help inactivity plans by the leader only when it
Trava [24]

Answer:

The statement is false.

Explanation:

In Laissez-faire Style of group leadership, the members of the group are given all the responsibilities by the leader or the manager. The members of the group take all the decisions and control the working of the group. The manager provides with some guidance or support only when it is asked by the group members.

4 0
3 years ago
Other questions:
  • What websites can help you learn about general career treads
    11·1 answer
  • Given an list of N integers, Insertion Sort will, for each element in the list starting from the second element: Compare the ele
    8·1 answer
  • The difference between a want and a need is a want is not necessary for survival. Things necessary for survival are known as ___
    6·1 answer
  • ________ are used in input, processing, and output operations that can help create more efficient programs as the data can be pr
    11·1 answer
  • Write a method called swapPairs that switches the order of values in an ArrayList of strings in a pairwise fashion. Your method
    9·1 answer
  • Write a program that takes an integer n as a parameter and sums all of the multiples of 2 or 5 from 1 to n. For example, if n =
    14·1 answer
  • Robert gets home from school at 3 p.M. His mom has to leave for her shift at work at 3:15 and she wants him to watch his baby br
    9·1 answer
  • Write a function named enterNewPassword. This function takes no parameters. It prompts the user to enter a password until the en
    6·1 answer
  • Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
    13·1 answer
  • How does a computer do its work? Mention its working principle.<br><br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!