Answer:
cookies are stored on client side.
A hacker would need access to your computer, either by physically reading the cookie data or by means of cross-site scripting.
Other than that, cookies should not contain passwords or credit card numbers, just things like preferences or session identifiers.
What is the value of the variable index after the Python code below is executed? word = 'bAnana' index = word.find('a')
Answer:
index = 3
Explanation:
the find() function finds the first instance of a letter or word.
'b' = 0
'A' = 1
'n' = 2
'a' = 3
'n' = 4
'a' = 5
the first instance of 'a' in "bAnana" is found at index location 3 computer scientist start counting from zero.
Program Explanation:
In the given code, a variable "word" is declared that initializes with a string value that is "bAnana".In the next line, an "index" variable is defined that uses a "word" variable with the find method that prints the index value of "a".Using the print method, that prints the "index" value.Program:
word = 'bAnana' #defining a variable word that initializes with string value
index = word.find('a')#defining a variable index that calls the find method to print index value of a
print(index)#print index value
Output:
Please find the attached file.
Reason for the output:
Since the array of indexing starts with 0 so, the index value of "a" is "3".
Learn more:
brainly.com/question/13437928
Why is the unallocated space of a Windows system so important to a forensic investigator?
Answer:
Unallocated space can potentially contain all of these types of files and evidence, either completely or partially as fragments, which can remain untouched for long periods of time, even years after the deletion or activity. This data and evidence cannot be viewed by an ordinary computer user, but can be recovered and examined with specialized forensic software and the expertise of a forensic investigator .
Hope this helps :))
if someone has become very attached to their device and feels anxious if they cannot connect to the internet what are they experiencing
Answer:
anxiety or depression
Explanation:
Because if you like an device if you get get it you get sad and sad and sadder
Which system changeover method would you recommend for an air traffic control system upgrade? Explain your answer.
Answer:
The definition regarding the given concern is outlined in the following part on the clarification.
Explanation:
As a consequence of technological change, organizations continue to update their software management systems. In implementing a traffic support system update, many methods of changeover growing are considered. The Pilot Changeover procedure is ideally among the different procedures of exchange. The process includes testing the device across a minimal scale at an approved site until the commitment to start it in their organization becomes undertaken.After satisfactory testing, the immediate changeover method becomes required to start the device. This approach is also advantageous as it helps the organization to operate the current model parallel towards the previous one although at much significantly cheaper cost than the simultaneous switching system, rendering it more cost-effective. This happens although the device becomes less expensive, this is fewer expensive because around a similar moment it would not encourage the commercial procedures to generate any disruption.In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.
Answer:
Compliance requirements of moving data and services into the cloud:
In other to use cloud services, one has to comply or follow the rules of the service providers, the country of the location where these services are provided. All these are necessary for the safety of the data stored in the cloud.
Some countries, regions, often set up rules guarding usage and storing data in the cloud. So it is very important to be aware of this. For instance, some countries enforce data localization laws which make data of its citizen stored in the servers of the country. Here, the country has full protection over the data hosted.
There are also data sovereignty laws that give the country hosting the data a sort of authority to exercise in accordance with the law binding cloud data hosting in their region. This gives the country easy access to information in case of any legal means.
So, when choosing a cloud application, it’s important for an organization to select an application that will aid in cloud compliance and improve your security posture, not create more risk.
It is very important to first know which law is applicable to the country one is residing so as to comply with cloud usage to avoid fines and legal cases.
Risks of moving data and services into the cloud
It is good before using cloud services to know who could possibly have access to the data, if it is safe, how long could data be stored.
If there are unauthorized use of cloud services, the organization providing the service might not be aware of the safety of the hosted data which eventually decreases an organization's visibility and control of its network and data.
Data stored in the cloud could become incomplete, stolen, lost.
The client might not be able to control who else has access to the stored data.
Moving data and services into the cloud could become unattractive again as organizations could lose clients and revenue if clients' trust no longer exists.
Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. Use overloaded methods to implement seat allocation: When a user specifies a seat (row, column), make sure it is available. When a user specifies a price, find any seat with that price. Write appropriate responses to the user if the seat is already taken, if their seat is available, or the seat number of the assigned seat if they just specified a price, etc.
A theater seating chart is implemented as a two-dimensional array of ticket prices, like this:_______.
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30
Answer:
Answer is given in the attached document.
Explanation:
Explanation is given in the attached document.
Answer:
i do not know
Explanation:
What is the key function provided by a network
Answer:
A key Network Function (NF) of SBA is the Network Repository Function (NRF), which provides NF service registration and discovery, enabling NFs to identify appropriate services in one another.
hope this helps
Explanation: