1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
2 years ago
11

चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​

Computers and Technology
1 answer:
Kruka [31]2 years ago
7 0

Answer:

Five provisions of cyber ethics are:

Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.

You might be interested in
true or false You are able to change the formatting of a table after it is inserted into a placeholder.
ozzi

Answer:

True

Explanation:

True, because you can always remove the placeholder afterwards

3 0
3 years ago
What are acenders? What are decenders?
Arte-miy333 [17]

Answer:

Explanation:

An ascender is the part of a lowercase letter that extends above the mean line of a font, or x-height

The descender is the part that appears below the baseline of a font.

8 0
3 years ago
Read 2 more answers
While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
Darina [25.2K]

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

4 0
2 years ago
Technologies designed to replace operating systems and services when they fail are called what?
Pie

Answer:

Bare metal recovery.

Explanation:

Technologies designed to replace operating systems and services when they fail are called bare metal recovery.

Basically, it is a software application or program which is primarily designed to enable users to reboot the affected system and services that have failed, usually from a removable media, CD-Rom using an image file of the operating system backup.

4 0
3 years ago
You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on.
Elan Coil [88]

Answer:

D: Use a multimeter to test the power supply

Explanation:

We want to determine whether the power supply is causing the reboots. Now, the most ideal thing to do will be to connect a multimeter to help in testing the source of power supply. This is because a multimeter measures the major factors in power which are voltage, current and resistance and as such it is therefore a standard diagnostic tool used widely by technicians in the electrical & electronic industries.

5 0
2 years ago
Other questions:
  • Which two technologies support the building of single-page applications?
    11·1 answer
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • When performing a basic search with Bing, you first type in your search expression and then click a button to begin the search;
    13·1 answer
  • Select the correct answer.
    10·1 answer
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • List any three positive impact of a computer​
    9·1 answer
  • What is Utility Software ? Name any two utility programs. <br>​
    15·2 answers
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!