If you suspect cyber crime what do you u do?​

Answers

Answer 1

Answer:

Hey mate.....

Explanation:

This is ur answer.....

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Hope it helps!

Brainliest pls!

Follow me! :)

Answer 2

Answer:

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Explanation:


Related Questions

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

Which type of website would allow Evan, an avid traveler, to share photos and videos with his friends

Answers

Answer:

G00GLE Photos? I'm not sure what you mean.

Explanation:

Search engine Photos is the type of website would allow Evan, an avid traveller, to share photos and videos with his friends.

What is meant by website?

A website, often referred to as a web site, is a compilation of web pages and related content that is uploaded to at least one web server and given a common domain name. A group of World Wide Web pages that are often available online and connected to one another by a person, company, higher education institution, government, or other organization.

The primary objective of certain websites is to only present, disseminate, or display certain data or content online.

A website is a collection of connected web pages with a common domain name. The website can be made by anyone, including individuals, groups, and businesses. All websites are a part of the World Wide Web.

Thus, it is Search engine Photos.

For more details about website, click here:

https://brainly.com/question/19459381

#SPJ2

what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?

Answers

connections, allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. They do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.

Which browser feature will delete your history, cache, and cookies the moment you close the special window

Answers

Answer:

Private Browsing

Explanation:

Stuff like DuckDuckGo or Brave

The reason most people refer to "filming" a video on a cell phone camera is that:

A) a smartphone creates film.

B) the video requires a filter.

C) the word is a holdover from when films were made.

D) the video will be converted to a film later.

Answers

Answer: C

Explanation:

obviously cellphones work digitally and do not produce actual film, nor is it likely it will be converted to film from digital (whats the point?)

PLEASE HELP! WILL MARK AS BRAINLIEST!
JavaScript can be implemented using the _________ HTML tags in a web page.

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the HTML tag

Explanation:

Answer:

statements placed within script tags

Explanation:

CODEHS 3.5.4 Obi-Wan Says



You should ask the user for three pieces of information

You should confirm their name and how many droids and Wookiees they want to meet

You should confirm their name and how many droids and Wookiees they want to meet

Answers

The program receives inputs for the name, number of droids and wookiees a user wants and displays the information as a complete sentence. The program written in python 3 goes thus :

name = input('Enter name : ')

# prompts user of name

num_droid = int(input('number of droids : '))

#prompts for number of droids

num_wooks = int(input('number of wookiees : '))

#prompts for number of wookiees

print(name, ' wants to meet', num_droid, 'droids and',num_wooks , 'Wookiees' )

#displays the information as a complete sentence

A sample run of the program is attached

Learn more : https://brainly.com/question/25506437

Learning Objectives:

• understand when to use the different

print statements

• create a variable and assign it a value

• use Scanner to read in user input

• print the value of a variable using

printf




Output:

US state: Texas

Capital: Austin

The capital of Texas is Austin

Description:

Copy and paste the code below:

/*******************************************************

* Name:

* Assignment: A01

*******************************************************/


public class A01{


public static void main(String[] args){

// part1

System.out.print("x x x");

System.out.print("x o x");

System.out.print("x x x");

System.out.println();


// part2


}

}


Write your name in the comment on top. The red letters in the output are the user inputs.

This assignment consists of 2 parts.

First you demonstrate your understanding of the different print statements by modifying a

code segment. Then you read in two Strings and print a statement based on the user input.


Part1:

The code segment provided includes

three print statements that produce

the following output:


Change the code segment so that it

produces the following output:


Hint: you will need to change the number of

statements


Part2:

• Prompt the user to enter a state

• Read in the user response and assign

it to a String variable named state

Hint: before you can assign a value to the

variable state it needs to be declared

• Prompt the user to enter the name of

the capital

• Read in the user response and assign

it to a String variable named capital.

• Use printf and format specifiers to

print the following message:

The capital of state is capital

where you substitute state and capital with

the state and capital entered by the user.

Make your output look exactly like the output displayed above.

Make sure to read in the input next to the prompt but without touching it (use a blank to

separate the prompt from the user input). The output should use a single empty line to

separate the frog displayed in part1 from the output created in part2.

Answers

Answer:

take out the cord than put it back in than it shall work

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

Yes









Because you didn’t block them
Yeah you can since they aren’t blocked

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

The first step of the Data Encryption Standard (DES) involves breaking the plaintext into blocks of ______.

Answers

Answer:

64 bits

Explanation:

DES uses block encryption

Explain what each line of code does:

a) const PI = 3.14

b) radius = float(input(“Enter radius: ”))

c) Area = PI * radius * radius

d) print(area)

Answers

Answer:

10 please mark me as brainleast

A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.

Answers

Answer:

A(n) videoconference allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.

pls explain the special keys on a keyboard and their functions ...eg shift key,control key​

Answers

Tab- used to advance the cursor to the next tab stop.

Shift- allows you to type capital letters and the symbols at the top of the keys

Control-  enabling other keys on the keyboard to perform secondary functions

Alt- used to change (alternate) the function of other pressed keys

CapsLock- causes all letters of bicameral scripts to be generated in capital letters.

Answer:

Multiple functions

Explanation:

If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :

#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.

For example, in this sentence I typed F while pressing the shift key as well:

Frederick looked out the window.

While in this one, I didn't.

frederick looked out the window.

My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.

#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.

For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.

I hope this was very helpful, and let me know if you need any further assistance in the future! ( :

which file access access flag do you use to open a file when you want all output written to the end of file's contents

Answers

Answer:

ios::app

Explanation:

A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository

Answers

Answer:

A data dictionary is also known as metadata repository.

Maya wants to connect three peripheral devices to her laptop , but has only one USB port. What is the best way to connect all the devices?

Answers

Answer:

USB hub.

Explanation:

Ingrid works in the information technology department of a big company. Whenever the company hires someone new, she has to set up a new computer for them. In this scenario, Ingrid will easily be able to set up a computer because the information on how to set up the computer is stored in her Group of answer choices procedural memory. episodic memory. semantic memory. flashbulb memory.

Answers

Answer:

procedural memory

Explanation:

Procedural memory is a type of implicit memory (unconscious, long-term memory) which aids the performance of particular types of tasks without conscious awareness of these previous experiences.

The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Answers

Answer:

The term spyware refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Does anyone know who this man issss?

Answers

Kaeya Should be the correct answer

The secondary storage device that is LEAST portable is a
A. DVD
B. Flash drive
C. Floppy disk
D. Hard disk

Answers

Answer:

B. flash drive

Explanation:

because it is portable

You are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Answers

Answer:

hYou are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Explanation:

Your customer said that understanding the directions is difficult. This is an aspect of

Answers

Answer:

Usability

Explanation:

The degree to which a program meets the needs of a user, including but not limited to learnability, reliability, and ease of use

What security feature on a smartphone prevents the device from being used until a passcode is entered?

Answers

Answer:

Lock Screen

Explanation:

During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.

Answers

Answer:

developed and tested.

Explanation:

Coordination in a global information system requires a _____ architecture for data, standardization within departments.

Answers

Coordination in a global information system requires a decentralized architecture for data, standardization within departments

pretty sure nones gonna do this but please do it would gelp alot of my exams irs gonna bring me like 10 marks :(

Answers

I wanna help so bad but I failed cs

To break a page click the _______ tab​

Answers

Answer: Page Break (or press ctrl + enter on keyboard)

Explanation:

Which one of the following is not an advantage of using networks?

Ability to share files
Technical knowledge needed
Central maintenance and support
Easier to back up files

Answers

Answer:

sorry i don know

Explanation:

* what is an electronic mail ?

= Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.​

Answers

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

Other Questions
1. A stone is thrown vertically upward with velocity of 15 m/s at the same time, 10 m vertically above a second stone is allowed to fall. After what time and at what height do they collide (take g = 10 ms^-2) What is 5,000 x 1,000 Which of the following questions could you ask the consumer to help determine if they are enrolled in PACE or another SCO plan? A synonym is a. A word that has the same meaning as another c. A word that lacks creativity b. A word that has the opposite meaning as another d. A word that is repeated too often in a paragraph. No links please Is a research paper argumentative? Is it argumentative if the subject of the paper is about how the ethnicity of a singer-songwriter influenced how they chose to write their songs. -7(11) is -77 or 81 I need help.......... . A line has a slope of 8 and includes the points (5,3) and (4,z). What is the value of z? If Val walls 1/2 mile for every 3/4 mile she runs if she walked 2 miles how many miles did she run 4. Disculpe. enter answer Ud. la direccin del Mercado El Kihuic? 5. Mi esposo enter answer al chef muy bien. Es posible hablar con l? 6. Yo no enter answer el nombre del teatro. Cmo se llama? 7. Es esa seora Laura Esquivel? Yo enter answer sus novelas, y me encantan! 8. Nosotros no enter answer montar a caballo. Dnde podemos aprender? A rope is stretched tight between the topsof two flag poles. One pole is 16 m tall, theother is 8 m tall and they stand on levelground 6 m apart. Find the rope's length.m The area of the globe located east of the prime meridian is called the _____________ .A) Southern HemisphereB) Eastern HemisphereC) Northern Hemisphere FROM THE BOOK, BRIAN'S WINTER - Describe a time when you have been too anxious to sleep. Compare your feelings to Brians. What are Spore-bearing structures in fungi called what? What Indigenous social movement organized land occupation and won titles for 350,000 people in Brazil A rectangular garden is 20ft longer than it is wide. Its area is 6300ft^2. What are its dimensions Differences between private company and cooperative Which of the following is part of the cryosphere?A. The oceanB. WetlandsC. PermafrostD. Aquifers i need help on this math problem How many country are in the world