1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
8

b. Suppose instead that Miller had written a routine to constantly change his assigned IP address to other addresses used by his

ISP. If the SLS intrusion system determined what Miller was doing and then added the entire range of ISP addresses to the banned list, thus stopping any user of the ISP from connecting to the SLS network, would SLS’s action be ethical?
Computers and Technology
1 answer:
amm18123 years ago
5 0

Answer:

It wouldn't be legal practice of SLS’

Explanation:

The Internet service address is the address of the internet where we getting the address of the internet sometimes it is known as the computer address of the host machine.  

Since the miller has changed the Ip address continuously in a constant manner also the other address which is giving by the internet service provider  The transfer of IP address, Miller will be able to receive their network. That sort of practice is not legal of SLS.

You might be interested in
Create a spreadsheet that lists the ten currencies you chose. For each currency, enter an amount and create a
Softa [21]

Answer:

its a very lengthy one

Explanation:

4 0
2 years ago
Answer this question for points lol
Zanzabum

Explanation:

jxjxnxnxnxkxozj nxkakthanksssssss lolll

8 0
3 years ago
Read 2 more answers
What key should you press and hold to select and open multiple files at one time? Enter Alt Control Esc
Yuliya22 [10]

Press and hold down the CTRL key while you drag the file to another folder. Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.

3 0
3 years ago
Read 2 more answers
Where ....................... the books that you borrowed? *
zzz [600]

Where ARE the books that you borrowed?

3 0
3 years ago
When Twitter is used to gather a large group for a face-to-face meeting it is called
Verdich [7]
The answer is flash mob. They called it flash mob when a large number of people in twitter gather in group for a centralized face to face meeting. In flash mob, people are gathering to be able to create a community that is helping each other or even just talking to each other.
8 0
3 years ago
Other questions:
  • To create a chart you need to select at least ___ in a range of data
    15·1 answer
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    14·1 answer
  • What is the printout of the call nPrint("a", 4)?
    14·1 answer
  • The _ are the devices that allow a computer system to communicate and interact with the outside world as well as store informati
    11·1 answer
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • One page of content in a PowerPoint presentation is referred to as a
    12·1 answer
  • Which ofthe following sentence beginnings would be best to use in apersuasive request?
    8·1 answer
  • Linda is viewing the campaign report in her Google Ads account after successfully implementing conversion tracking tags for her
    7·1 answer
  • Implement the Tollable interface. It provides one method, pay, that accepts an int (how many dollars to pay), and returns an int
    8·1 answer
  • Anyone know how to fix black screen of death on computer​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!