Answer:
The answer is YES.
Explanation:
<em>Things pertaining to weapons, destructive materials should be shared with precautions or much better if these things should not be put online. Since internet is widely available to almost all types of users and almost to all places, we cannot be sure of who will get hold of these information. Kids could easily see this and gain knowledge and out of curiosity will try these dangerous things. Terrorist groups will also have access to these information and who knows might happen to poor innocent souls around. </em>
<em>
</em>
<em>I don't think it would violate the right of First Amendment regarding freedom of speech. Freedom should be granted on matters that are most sensible. And this time, we are just protecting the rights of children and other innocent people who can be a victim including you. We are talking about weapons and destructive materials here which is non beneficial if one could get hold of this information, in my opinion. If there is really a need to construct these things, it is better to consult an expert or an authority to ensure that nobody gets harm.</em>
The file that contains full and incremental back-up information for use with the dump/restore utility is <u>/etc/dumpdates.</u>
<u></u>
<h3>What is dump/restore utility ?</h3>
Dump examines files in a filesystem, determines which ones need to be backed up, and copies those files to a specified disk, tape or other storage medium. Subsequent incremental backups can then be layered on top of the full backup.
The restore command performs the inverse function of dump; it can restore a full backup of a filesystem. Single files and directory subtrees may also be restored from full or partial backups in interactive mode.
Learn more about incremental backups
brainly.com/question/5849057
#SPJ4
Answer: Discretionary access control (DAC)
Explanation: Discretionary access control is the control system that is imposed over the information system. The information systems contains different objects and subjects that gets the permission to do the operations.
The operation which the components can do are sharing the data to other object or subjects, privilege providence, change in the rules for the access, security entities getting changed etc.
Answer: C. although a rainy day (A) would make it more aesthetic
Based on the fact that the hacker's actions are done before the application reading of the lives purchased, this is <u>d. Race condition. </u>
<h3>What is a race condition?</h3>
This is when certain processes in an application depend on the timing of a a previous process or event. The flow of information can then be intercepted before the process completes.
This is what the hacker did here by accessing the application to change the number of lives purchased before the application read the number of lives purchased.
In conclusion, option D is correct.
Find out more on the race condition at brainly.com/question/13445523.