Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following can also consider as the instances of Open Design?
Home
Cyber Security
Which of the following can also consider as the instances of Open Design?
0
votes
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
Which of the following can also consider as the instances of Open Design?
a) CSS
b) DVD Player
c) Only A
d) Both A and B
cyber-security
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
May 2, 2022
by
sharadyadav1986
d) Both A and B
CSS and DVD Player
can also consider as the instances of
Open Design
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
steal
spy
cyber-security
0
votes
Q: The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
Q: Which of the following can execute all the possible combination of attacks?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
attacks
cyber-attacks
cyber-security
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following act violates cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following is not an advantage of cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following is a type of cyber security?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
Q: Which one of the following refers to the technique used for verifying the integrity of the message?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
software-integration
cyber-security
0
votes
Q: Which of the following refers to the violation of the principle if a computer is no more accessible?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
computer-principle
cyber-security
0
votes
Q: Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
ethical-behaviors
...