Answer:
Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.
- Be Careful With Your Tone.
- Be Accurate and Factual.
- Search First, Then Ask.
- Don't Use Sarcasm Freely.
- Be as Polite as You Are In Person.
Explanation:
#include<iostream>
#include<string.h>
using namespace std;
char *removestring(char str[80])
{
int i,j,len;
len = strlen(str);
for( i = 0; i < len; i++)
{
if (str[i] == ' ')
{
for (j = i; j < len; j++)
str[j] = str[j+1];
len--;
}
}
return str;
}
int main ()
{
char str[80];
cout << "Enter a string : ";
cin.getline(str, 80);
strcpy(removestring(str), str);
cout << "Resultant string : " << str;
return 0;
}
In this program the input is obtained as an character array using getline(). Then it is passed to the user-defined function, then each character is analyzed and if space is found, then it is not copied.
C++ does not allow to return character array. So Character pointer is returned and the content is copied to the character array using "strcpy()". This is a built in function to copy pointer to array.
One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.
<h3>What is a cloud?</h3>
In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.
In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.
Read more on a virtual machine here: brainly.com/question/12060797
#SPJ1
Complete Question:
Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?
A. Enable virtual machine API integration.
B. Rotate the cloud access keys.
C. Deploy an OSI layer 7 firewall.
D. Enable cloud resource activity auditing.
Answer: The difference between highlighting the text and selecting the text is highlighting is when you change the highlight/back color of the text and selecting is when you temporarily highlight it to change a certain part.
Explanation:
It would be modem. The modem connects to the internet through their ISP's line via a (usually) coaxial cable. The modem then transfers information to a router, which is used to transfer the information coming from the internet to the rest of the devices on the network, wired, wireless, or both.
Nowadays, though, modems and routers tend to come in a two-in-one, whether it's first-party provided by your ISP, or third-party where you've purchased one. This two-in-one is often just referred to as the router, so this could well be the answer to your question as well.
The reason I stated the above answer, is because a regular router on its own is unable to connect to the internet, it must be receiving internet from somewhere. The two-in-one however would have the coaxial cable to connect to the internet, as well as your usual Ethernet ports and wireless capability.