Answer:
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.
Answer:
C) have more security vulnerabilities than software
Explanation:
Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.
However, some of the characteristics of Hardware VPN is the following:
1. It is expensive compared to software VPN
2. It is generally faster
3. It requires more than a beginner to handle
4. With an in-built firewall, it is generally more secure compared to a software VPN.
Hence, in this case, the correct answer is option C.
Answer: filter the data of employees with more than five years of experience
Explanation:
The technique that Peter can use to perform this analysis is to filter the data of employees with more than five years of experience.
Filter in spreadsheets allows one to see the data that is required based on the input that was given. In this case, since Peter wants to analyze the data of all employees that have experience of more than five years, this can be filtered and the employees who have experience of more than 5 years will be shown.
The workers who have experience of less than five years will not b shown in this case.
Answer:
Following are the code to this question:
/*using the select statement, that selects column name from the table blog.posts */
SELECT blog.posts.user_id, blog.posts.body, users.name/*column name user_id, body, name*/
FROM blog.posts/* use table name blog.posts*/
RIGHT OUTER JOIN users ON blog.posts.user_id = users.id;/*use right join that connect table through user_id*/
Explanation:
In the structured query language, RIGHT JOIN is used to recovers from both the right side of the table both numbers, although the left table has no sets. It also ensures that even if the 0 (null) documents are linked inside this left table, its entry will always return the outcome row, but still, the number of columns from its left table will be NULL.
In the above-given right join code, the select statements used that selects the column names "user_id, body, and the name" from the table "blog. posts" and use the right join syntax to connect the table through the id.
Answer:
There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying