Answer:
Explanation:
The media and internet regulation depends on the country and the government.
For example:
China has the biggest Internet regulation in the world, there is not an occidental website like social media, It is practically the biggest intranet in the world, television and general media has a regulation in this Asian country.
Venezuela is another country with regulation, in this case, the internet is not closer than China, but television and newspaper are controlled by the government.
In countries like Mexico and Honduras, the governments spend a lot of money on advertising, this is not a regulation, but it is indirect control, in this way you see what they want you to see.
The four components of computer are explained clearly.
<u>Explanation:</u>
- Hardware is the electrical physical parts that a computer system needs to function. It organizes all the process by a circuit board that operates within a PC or laptop; built with the "motherboard", "graphics card", "CPU (Central Processing Unit)", "ventilation fans", "webcam", "power supply", and so on. Without hardware, there is no means of running the necessary software that makes computers so valuable.
- Software is a program that facilitates a computer to execute a particular task, as objected to the hardware. Computer software has to be "stored" into the computer's storage (such as a hard drive, memory, or RAM). Working computer systems segment software into three major classes: system software, programming software, and application software.
- A user is a person who handles a computer or network service. Users of computer and software output regularly require the technical expertise needed to fully know how they operate.
- Data is defined as bases or figures, or knowledge that's saved in or utilized by a computer. This data will be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be prepared by the CPU and are saved in files and folders on the hard disk.
Answer: C)report the status of individual computer users
Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.
Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)
Answer:
See explaination
Explanation:
CREATE TABLE CATEGORY
(
cid int NOT NULL,
description varchar2(1000),
PRIMARY KEY (cid)
);
CREATE TABLE PRODUCT
(
pid int NOT NULL,
description varchar2(1000),
cid int,
price int,
p_size varchar2(1),
CONSTRAINT chk_price CHECK (price>0),
CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),
CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)
);
Answer: Larz7, Dracofli0, butterbro171,OVOclan1011, ect.
Explanation: