Answer:
Five provisions of cyber ethics are:
Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.
<span>There are some network modeling tools that can scan the existing network.</span>
Answer:
A
Explanation:
A hacker searching for open ports denotes vulnerability of computer (to hacking).
Cheers
The last option:
Avoid forwarding e-mail messages unless you have permission to do so.
Answer: Close or disable all unused running apps.
Explanation: when unused apps keep runningon the device, it will make the device to keep lagging, thereby reducing it efficiency. But once those apps are disabled or closed and the system is probably restarted, the device will regain it efficiency back.