Answer:
The correct option is;
A. The file will not take up as much space on the database
Explanation:
Changing the field size of a field that does not contain data limits the size of taken up by the data values added to the field. The field size for text field determines the disc space that each value of the field allowed to take up by Access
When the field size is changed for fields containing data, the data values in the field that have values higher than the maximum field size are truncated while the field size of subsequent data are limited as stated above.
Answer:
What are the provisions of cyber law in Nepal?
Provision of cyber law of NEPAL
It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).
Hope this helps Have a good day
Answer:
A. Arbitrary code execution
Explanation:
A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem. When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.
Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.
Answer:
Certificate Signing Request(CSR).
Explanation:
Certificate Signing Request(CSR):- It is a message that is specially encrypted Which validates the information that is required by CA for the issuing of a digital certificate.
It is the first step towards getting your own SSL certificate.
So we conclude that the answer to this question is Certificate Signing Request (CSR).
Answer:
A concern that might be expressed by the legal department after reviewing the SLAs and terms of service is:
c. Ensuring that there is a guarantee that the cloud service provider will provide notice in the event that they decide to discontinue operations.
Explanation:
The SLA that the legal department will review should include a description of the services to be provided, expected service levels, measurement metrics for each service, each party's duties and responsibilities, and the contract remedies or penalties for breach, among others. But the legal department will be mostly concerned with legal remedies during breaches, liability limitation and warranties, and intellectual property protection issues than with more technical issues. This is despite the fact that all the terms of the SLA will be diligently reviewed by the legal department.