If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can't steal user's information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.

Answers

Answer 1

Answer:

cookies are stored on client side.

A hacker would need access to your computer, either by physically reading the cookie data or by means of cross-site scripting.

Other than that, cookies should not contain passwords or credit card numbers, just things like preferences or session identifiers.


Related Questions

Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. Use overloaded methods to implement seat allocation: When a user specifies a seat (row, column), make sure it is available. When a user specifies a price, find any seat with that price. Write appropriate responses to the user if the seat is already taken, if their seat is available, or the seat number of the assigned seat if they just specified a price, etc.
A theater seating chart is implemented as a two-dimensional array of ticket prices, like this:_______.
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30

Answers

Answer:

Answer is given in the attached document.

Explanation:

Explanation is given in the attached document.

Answer:

i do not know

Explanation:

Why is the unallocated space of a Windows system so important to a forensic investigator?

Answers

Answer:

Unallocated space can potentially contain all of these types of files and evidence, either completely or partially as fragments, which can remain untouched for long periods of time, even years after the deletion or activity. This data and evidence cannot be viewed by an ordinary computer user, but can be recovered and examined with specialized forensic software and the expertise of a forensic investigator .

Hope this helps :))

Which system changeover method would you recommend for an air traffic control system upgrade? Explain your answer.

Answers

Answer:

The definition regarding the given concern is outlined in the following part on the clarification.

Explanation:

As a consequence of technological change, organizations continue to update their software management systems. In implementing a traffic support system update, many methods of changeover growing are considered. The Pilot Changeover procedure is ideally among the different procedures of exchange. The process includes testing the device across a minimal scale at an approved site until the commitment to start it in their organization becomes undertaken.After satisfactory testing, the immediate changeover method becomes required to start the device. This approach is also advantageous as it helps the organization to operate the current model parallel towards the previous one although at much significantly cheaper cost than the simultaneous switching system, rendering it more cost-effective. This happens although the device becomes less expensive, this is fewer expensive because around a similar moment it would not encourage the commercial procedures to generate any disruption.

What is the value of the variable index after the Python code below is executed? word = 'bAnana' index = word.find('a')

Answers

Answer:

index = 3

Explanation:

the find() function finds the first instance of a letter or word.

'b' = 0

'A' = 1

'n' = 2

'a' = 3

'n' = 4

'a' = 5

the first instance of 'a' in  "bAnana" is found at index location 3 computer scientist start counting from zero.

The index value of "a" in python code is "3".

Program Explanation:

In the given code, a variable "word" is declared that initializes with a string value that is "bAnana".In the next line, an "index" variable is defined that uses a "word" variable with the find method that prints the index value of "a".Using the print method, that prints the "index" value.

Program:

word = 'bAnana' #defining a variable word that initializes with string value

index = word.find('a')#defining a variable index that calls the find method to print index value of a

print(index)#print index value

Output:

Please find the attached file.

Reason for the output:

Since the array of indexing starts with 0 so, the index value of "a" is "3".  

Learn more:

brainly.com/question/13437928

What is the key function provided by a network

Answers

Answer:

A  key Network Function (NF) of SBA is the Network Repository Function (NRF), which provides NF service registration and discovery, enabling NFs to identify appropriate services in one another.

hope this helps

Explanation:

if someone has become very attached to their device and feels anxious if they cannot connect to the internet what are they experiencing

Answers

Answer:

anxiety or depression

Explanation:

Because if you like an device if you get get it you get sad and sad and sadder

In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.

Answers

Answer:

Compliance requirements of moving data and services into the cloud:

In other to use cloud services, one has to comply or follow the rules of the service providers, the country of the location where these services are provided. All these are necessary for the safety of the data stored in the cloud.

Some countries, regions, often set up rules guarding usage and storing data in the cloud. So it is very important to be aware of this. For instance, some countries enforce data localization laws which make data of its citizen stored in the servers of the country. Here, the country has full protection over the data hosted.

There are also data sovereignty laws that give the country hosting the data a sort of authority to exercise in accordance with the law binding cloud data hosting in their region. This gives the country easy access to information in case of any legal means.

So, when choosing a cloud application, it’s important for an organization to select an application that will aid in cloud compliance and improve your security posture, not create more risk.

It is very important to first know which law is applicable to the country one is residing so as to comply with cloud usage to avoid fines and legal cases.

Risks of moving data and services into the cloud

It is good before using cloud services to know who could possibly have access to the data, if it is safe, how long could data be stored.

If there are unauthorized use of cloud services, the organization providing the service might not be aware of the safety of the hosted data which eventually decreases an organization's visibility and control of its network and data.

Data stored in the cloud could become incomplete, stolen, lost.

The client might not be able to control who else has access to the stored data.

Moving data and services into the cloud could become unattractive again as organizations could lose clients and revenue if clients' trust no longer exists.

Other Questions
d = b^2 -4ac solve for a 2/3 (x-18y) = 6y solve for x Calculate the density in g/mL of 2.0 L of gasoline that weighs 1.34 kg Adam has $200 to spend and wants to buy either a new amplifier for his guitar or a new cell phone. Both the amplifier and the cell phone cost $200, so he can only buy one. This illustrates the basic concept that: A jug has a maximum capacity of 4 liters. It's filled to 85% of its capacity, and then poured out at a rate of 25 ml/s. Which of the followingexpressions models the volume remaining in the jug, in liters, after x seconds? The Phoenicians were based on the coast of the Mediterranean. Why wastheir location near the sea significant? * Part A In "The Medicine Bag," before Grandpa comes to visit, how does the narrator feel about talking to his friends about his Sioux grandfather? A. He makes fun of how Grandpa dresses and where he lives to amuse his friends. B. He becomes angry when the other children make fun of Grandpa's heritage. C. He likes the fact that his stories about Grandpa appeal to the other kids. D. He never reveals to his friends that Grandpa is a Sioux. what is does anime stand for Which best describes thWhy was the development of an alphabet an important advancement for the Phoenician civilization? Check all that apply.E organization of Phoenicia? If n-8=-3, what is 3n? Too much focus on your organizational vision can lead to missed opportunities. __________ helps keep the company focused on ideas from the external environment. What event was added to the Health Science category for 2020-2021? in the opening case study the nurse is Mrs Nelson I believe I can get both of the draw blood from your hair with a warm cloth and peroxide if you have just a little bit of time what kind of skills is being demonstrated What does the sloth symbolize in Life of Pi if you start making $265 monthly contributions today and continue them for four years, what is the furture value if the compounding rate is 9.75 percent APR? 9. When exercising, your heart pumps a large amount of what through your body? Sugar FatHormones Blood The scattering of dissolved particles evenly is called 1. How did the plague reshape European Society? 2. What were the causes, course, and consequences of the Hundred Year War? The area of a rectangular football field is 7200m while its perimeter is 360m. Calculate the;dimension of the field QuestionOsmosis differs from diffusion mainly in that:A. In Osmosis, the water moves against the concentrationgradient.B. In Diffusion, the water moves down the concentrationgradient. C. In Diffusion, the water moves against the concentrationgradientD. In Osmosis, the water moves down the concentrationgradient, Is zig zag a quality of a line