1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
11

When describing a software lincense, what does the phrase "open source" mean?

Computers and Technology
1 answer:
NikAS [45]3 years ago
8 0

Answer:

The phrase "Open Source" means that a program's source code is freely available and may be modified and redistributed.

Explanation:

Hope this helped :)

You might be interested in
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic
VladimirAG [237]

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

8 0
3 years ago
Which document contains the dod cyber regulations for cui and cti??
ivolga24 [154]
<span>The question above has multiple answers you can choose from;

a. DFAS
b. FR-CI
c. DFARS
d. AR 25-2

The answer is (C) DFARS

On October 4, 2016, the Department of Defense issued a rule finalizing cyber reporting regulations. This rule was applicable to Department of Defense contractors and subcontractors. Notably, the final rule clarifies by CDI (covered defense information). This term is used in the DFARS (Defense Federal Acquisition Regulation Supplement). It defines CDI to include 4 categories; covered technical information (CTI); controlled unclassified information (CUI); operations security; export controlled information; and any other information identified or otherwise marked in the contract.</span>
7 0
3 years ago
What will be the output after the following code is executed?
Gnesinka [82]

Answer:

D) Gaddis, Tony

Explanation:

- When you look at the function <em>pass_it</em>, it takes two arguments and returns these arguments with a comma between them.

- <em>name1</em> and <em>name2</em> variables are assigned as Gaddis and Tony.

<em>fullname</em> variable calls the the <em>pass_it</em> and gives above variables as arguments.

<em>fullname </em>variable (which is now equal to Gaddis, Tony) is printed.

4 0
3 years ago
Write a Java program that creates a two-dimensional array of type integer of size x by y (x and y must be entered by the user).
spayn [35]

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int x, y;

 System.out.print("x and y: ");

 x = input.nextInt(); y = input.nextInt();

 int[][] twoD_arr = new int[x][y];

 for(int i = 0;i<x;i++){

     for(int j =0;j<y;j++){

         twoD_arr[i][j] = (int)(Math.random() * 100);      }  }

 System.out.print("Search: ");

 int numSearch = input.nextInt();

 int count = 0;

 for(int i = 0;i<x;i++){

     for(int j =0;j<y;j++){

         if(twoD_arr[i][j] == numSearch){

             count++;

             System.out.println("Row "+(1+i)+" Column "+(j+1));          }          }    }

 if(count == 0){ System.out.print("Key does not exist");  }

}

}

Explanation:

Declare x and y

 int x, y;

Prompt user for x and y

 System.out.print("x and y: ");

Get input for x and y

 x = input.nextInt(); y = input.nextInt();

Declare the two dimensional array

 int[][] twoD_arr = new int[x][y];

Iterate through the rows

 for(int i = 0;i<x;i++){

Iterate through the columns

     for(int j =0;j<y;j++){

Get input for each cell

         twoD_arr[i][j] = (int)(Math.random() * 100);      }  }

Prompt the user for search key

 System.out.print("Search: ");

Get input search key

 int numSearch = input.nextInt();

Initialize count to 0

 int count = 0;

Iterate through the rows

 for(int i = 0;i<x;i++){

Iterate through the columns

     for(int j =0;j<y;j++){

Check if current element and the search key are the same.

         if(twoD_arr[i][j] == numSearch){

Increment count by 1, if they are the same

             count++;

Print the position

             System.out.println("Row "+(1+i)+" Column "+(j+1));          }          }    }

If count is 0, print key does not exist

 if(count == 0){ System.out.print("Key does not exist");  }

4 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being
    14·1 answer
  • Where are the Add Level and Delete Level buttons located? Filter options list Sort &amp; Filter group Sort dialog box Custom fil
    11·1 answer
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • There are three types of operators in BASIC-256 <br>a) True b) False​
    12·1 answer
  • Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)
    8·1 answer
  • what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple system
    6·1 answer
  • How to use a state value in stylesheet in react native.
    6·1 answer
  • Which page layout is most commonly used for a website with a large navigation menu?
    13·1 answer
  • Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from
    7·1 answer
  • A diagram of a ten-node network that uses ten routers
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!