is there provision of monetary fine against Cyber Law in Nepal

Answers

Answer 1

Answer:

Accessing any computer system without authority results in imprisonment for three years, or a fine of two hundred thousand rupees, or both. Intentional damage to or deleting data from a computer system carries imprisonment for three years, or a fine of two hundred thousand rupees, or both

Explanation:

hope this helps you


Related Questions

The most effective leaders treat everyone alike. True True False

Answers

Answer:

you have to have evidence they do that and on the question theirs no evidence so the answer would be false (as long as theirs no evidence)

Explanation:

Answer:

True

Explanation:


Can Anyone see what's wrong in this
this is not working why ?
you can see in picture its not working why ?
please help me
can u see what the problem

Can Anyone see what's wrong in this this is not working why ?you can see in picture its not working why

Answers

do you mean the highlighted part, "<img scr = "https : // images. app. goo. gl?"

help teacher said with complete explanation ​

help teacher said with complete explanation

Answers

Answer:

use the first graph to help you find out

2. Read the following scenarios about how three different programmera approach
programming a computer game. Identify which type of programming design
approach each represents (3 points):
a) Yolanda first breaks down the whole game she needs to program into modules.
She then breaks these modules into smaller modules until the individual parts are
manageable for programming. She writes the smallest modules, and then
recombines them into larger parts.
b) Isabella takes the game process and groups together sets of related data involved
in the process. She then identifies the messages the data should respond to. After
writing the code for each set of data, Isabella then combines, tests, and refines the
subsets until the software runs properly

Answers

a.) Structured programming

b.) Object-oriented programming

c.) Top-down programming

The programming design approach represented in this scenario is modular programming. The programming design approach represented in this scenario is object-oriented programming.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Modular programming is the programming design approach represented in this scenario.

Yolanda divides the entire game into modules, which are then subdivided further into smaller modules until the individual parts are manageable for programming.

Object-oriented programming is the programming design approach represented in this scenario. Isabella organizes sets of related data and determines which messages the data should respond to.

Thus, this method entails representing data and functions as objects and employing inheritance and polymorphism to generate flexible and reusable code.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

relation between different temperature scale ​

Answers

The realtor. Between different temperature scale is

Which of the following is NOT true about simple machines?

Group of answer choices

They can change the amount of force required.

They can reduce the amount of work that must be done.

They can change the distance over which a force is exerted.

They can change the direction in which a force is exerted.

Answers

Answer:

option A : they can change the amount of force required .

Write a program with an array that is initialized with test data. Use any primitive data type of your choice. The program should also have the following methods:
• getTotal. This method should accept a one-dimensional array as its argument and return the total of the values in the array.
• GetAverage. This method should accept a one-dimensional array as its argument and return the average of the values in the array.
• GetHighest. This method should accept a one-dimensional array as its argument and return the highest of the values in the array.
• GetLowest. This method should accept a one-dimensional array as its argument and return the lowest of the values in the array.
Demonstrate each of the methods in the program using the data from the following four one-dimensional arrays.
// Some arrays of various types. int[] iarray = { 2, 1, 9, 7, 3 }; float[] farray = { 3.5F, 4.6F, 1.7F, 8.9F, 2.1F }; double[] darray = { 98.7, 89.2, 55.1, 77.6, 99.9 }; long[] larray = {100, 500, 200, 300, 400 };

Answers

Here's a Java program that includes the methods `getTotal`, `getAverage`, `getHighest`, and `getLowest` to perform calculations on different one-dimensional arrays:

public class ArrayOperations {

   public static void main(String[] args) {

       int[] iarray = { 2, 1, 9, 7, 3 };

       float[] farray = { 3.5F, 4.6F, 1.7F, 8.9F, 2.1F };

       double[] darray = { 98.7, 89.2, 55.1, 77.6, 99.9 };

       long[] larray = {100, 500, 200, 300, 400 };

       System.out.println("Total of iarray: " + getTotal(iarray));

       System.out.println("Average of farray: " + getAverage(farray));

       System.out.println("Highest value in darray: " + getHighest(darray));

       System.out.println("Lowest value in larray: " + getLowest(larray));

   }

   public static int getTotal(int[] arr) {

       int total = 0;

       for (int num : arr) {

           total += num;

       }

       return total;

   }

   public static float getAverage(float[] arr) {

       float sum = 0;

       for (float num : arr) {

           sum += num;

       }

       return sum / arr.length;

   }

   public static double getHighest(double[] arr) {

       double highest = arr[0];

       for (double num : arr) {

           if (num > highest) {

               highest = num;

           }

       }

       return highest;

   }

   public static long getLowest(long[] arr) {

       long lowest = arr[0];

       for (long num : arr) {

           if (num < lowest) {

               lowest = num;

           }

       }

       return lowest;

   }

}

This program demonstrates the four methods on the given arrays and prints the corresponding results. Each method performs the required calculations on the provided array type and returns the desired output.

Learn more about array here:

https://brainly.com/question/13110890

#SPJ11

Which is best online C compiler?

Answers

It offers the greatest C++ compiler, and it's extremely simple to manage different versions of a single application.

What does a software compiler do?

Compilers are specific software tools that convert the source code of one programming language into machine code, bytecode, or some other computer program. Usually, the original code is created in a high-level, understandable language for humans, such Java or C++.

Are compilers present on all computers?

No. Operating systems do this frequently but not always. Not all computers, but the majority, come with an operating system. Some highly well-known operating systems (OSs) may not include compiler or interpreter for popular programming languages, although they may do so for less well-known but platform-specific languages.

To know more about compiler visit:

https://brainly.com/question/28232020

#SPJ4

Which of the following is a country that cruise ships commonly sail under the flag of?
O United States
O Canada
O Panama
O South Africa
< Previous

Answers

Answer:

Panama

hope this helps!

Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction story that deals with artificial intelligence. He wants to be realistic. He decides to add computer terms to the story that pertain to his storyline.

A. Java
B. Python
C. Perl
D. Ruby

Answers

Answer:

java

Explanation:

Java es rápido, seguro y fiable. Desde ordenadores portátiles hasta centros de datos, desde consolas para juegos hasta computadoras avanzadas, desde teléfonos móviles hasta Internet, Java está en todas partes. Si es ejecutado en una plataforma no tiene que ser recompilado para correr en otra. Java es, a partir de 2012, uno de los lenguajes de programación más populares en uso, particularmente para aplicaciones de cliente-servidor de web

what command would you use to verify the data type of an object such as the number 7?

Answers

In Python, you can use the type() function to verify the data type of an object, such as the number 7. The type() function is a built-in function that returns the data type of an object.

Here's an example:

num = 7

data_type = type(num)

print(data_type)

In this code snippet, we define a variable num with the value 7. We then use the type() function to determine the data type of the num object. The result is assigned to the data_type variable. Finally, we print the value of data_type.

When you run this code, it will output:

<class 'int'>

The output indicates that the data type of the number 7 is an integer (int). The type() function returns the actual data type of the object, and the printed result provides the information about the data type.

Learn more about data type visit:

https://brainly.com/question/30615321

#SPJ11

how to fix iphone screen that wont move when i touch it.

Answers

Answer:

Explanation:

Press and quickly release the volume up button. Press and quickly release the volume down button. Press and hold the side button

1. Restart your iPhone: This is the easiest and most common way to fix issues with your phone. Press and hold the power button until “slide to power off” appears on the screen. Slide the button to power off and then press and hold the power button until the Apple logo appears.

2. Clean the screen: Oftentimes, a dirty screen can cause it to become unresponsive. Use a dry, soft cloth to wipe down the screen, and make sure to remove any cover or case that might be interfering with the touchscreen.

3. Remove any screen protector: If you have a screen protector on your iPhone, remove it and check whether the screen starts to respond to touch. Sometimes, the screen protector is the culprit.

4. Update your iPhone: Check for any software updates available for your iPhone. Tap “Settings,” then “General,” then “Software Update” to check for any available updates.

5. Force restart your iPhone: If your iPhone is still not responding to touch, force restart it by holding down the power button and the home button simultaneously until the Apple logo appears.

6. Contact Apple Support: If none of these solutions work, it’s best to contact Apple Support or visit an authorized Apple repair center for further assistance.

What are the flowchart symbols?​

Answers

Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.

Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.

Diamond shape: This types of  flow chart symbols represent a decision.

Rectangle shape:This types of flow chart symbols represent a process.

Start/End : it represent that start or end point.

Arrows: it represent that representative shapes.

Input/output: it represent that input or output.

Write a c++ programm that enter a number from the user and displays Fibonacci numbers from 1 to given number using function

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   cout << "Enter number: ";

   int number;

   cin >> number;

   int prevfib = 0;

   int fib = 1;

   while (fib <= number) {

       cout << fib << " ";

       int add = prevfib;

       prevfib = fib;

       fib += add;

   }

}

Which of the following statements about the current use of robots in pharmacies is accurate?
a.
They can receive orders for intravenous medications and deliver them.
b.
They have not been shown to increase efficiency or reduce errors.
c.
They have begun to replace pharmacists because they can dispense medications.
d.
They can administer intravenous medications to patients using syringes.

Answers

The accurate statement regarding the current use of robots in pharmacies is: a) They can receive orders for intravenous medications and deliver them.

Robots in pharmacies are increasingly being utilized to automate various tasks and improve efficiency. One of their capabilities is receiving orders for intravenous medications and delivering them.

These robots are programmed to handle the logistics of medication dispensing, reducing the manual workload for pharmacy staff and streamlining the process of preparing and delivering intravenous medications.

This automation can enhance accuracy, timeliness, and precision in medication administration.

However, it's important to note that the other statements (b, c, and d) are not accurate. Robots in pharmacies have indeed been shown to increase efficiency and reduce errors.

By automating routine tasks, robots can help prevent medication errors caused by human factors, such as misreading labels or incorrect dosing. They can also free up pharmacists' time, allowing them to focus on more complex clinical tasks and direct patient care.

To know more about robots click here

brainly.com/question/31996744

#SPJ11

how might a programmer best adapt a mate code arcade game to be more accessible to players with learning differences?​

Answers

Answer:

Explanation:

A programmer might best adapt a mat code arcade game to be more accessible to players with learning differences by implementing the following strategies:

Simplify the controls: One way to make the game more accessible is to simplify the controls. This can be done by reducing the number of buttons or keys that need to be pressed, or by using more intuitive controls such as touch screen controls.

Adjustable difficulty levels: Another way to make the game more accessible is to offer adjustable difficulty levels. This could include options for different levels of difficulty, or the ability to customize the game's settings to suit the player's individual needs.

Visual and audio cues: Visual and audio cues can also be used to help players with learning differences understand the game. For example, using clear and simple graphics, adding visual cues to indicate what actions need to be taken, and using sound effects and music to indicate when certain actions are required.

Provide tutorials: A tutorial can be provided for the players to learn how to play the game and understand the rules. It could be written or video tutorials, or interactive tutorials with voiceover.

Accessibility options: The game should be designed in such a way that it can be played with different accessibility options. For example, the game should be able to be played with keyboard and mouse, a controller, or a touch screen.

It's important to keep in mind that what works for one person with learning differences may not work for another, so it is recommended to test the game with a diverse group of players with learning differences and to gather feedback and make adjustments accordingly.

why are medical related professions and human resources important? ​

Answers

Answer:

See below.

Explanation:

Medical related professions are identified as one of the core building blocks of a healthcare system. The role of "medical related professionals" in healthcare industry is confined to managing safety and legal issues, ensuring efficient performance, and developing problem solving and decision-making skills.

write a line of java code to create an array of turtle objects called my turtles that can hold 20 turtle object references.

Answers

line of Java code creates an array of Turtle objects called myTurtles that can hold 20 Turtle object references.

What is Java code ?

Java code is a type of computer programming language used to create software for various platforms. It is an object-oriented language, meaning it has the ability to store data and instructions within objects, which can then be manipulated and reused. Java is class-based and strongly typed, meaning that all variables and methods must be declared before they can be used. It is a platform-independent language, meaning it can run on any machine regardless of the underlying operating system. Java is widely used in many industries, including banking, retail, and healthcare, as it is a reliable and secure language. Java code is also very easy to maintain and debug, making it an ideal choice for software development.

Turtle[] myTurtles = new Turtle[20];

To learn more about Java code
https://brainly.com/question/26789430
#SPJ4

WHO SAYS BUP ALL THE TIME ​

Answers

Answer:

Mario

Explanation:

You have a screen and a pen, which is an instance of the Turtle class.
What are the initial coordinates of the pen?
(100, 0)
(0,0)
(100, 100)
(0, 100)

Answers

Answer:

(0,0) and (0,100) (I think)

Explanation:

Answer:

(0,0)

Explanation: I got it right

the national kidney registry felt that their time would best be spent connecting donors and recipients, not managing its data infrastructure.

Answers

Outsourcing data infrastructure management to focus on donor-recipient connections.

Which programming language is commonly used for developing Android applications?

The National Kidney Registry recognized that their primary focus should be on facilitating connections between kidney donors and recipients rather than dedicating resources to managing their data infrastructure.

By outsourcing their data infrastructure management, they can leverage the expertise and resources of external service providers who specialize in data management.

This allows the organization to streamline their operations, minimize potential technical issues, and ensure that their valuable time and resources are directed towards their core mission of facilitating life-saving kidney transplants.

Learn more about data infrastructure

brainly.com/question/30930779

#SPJ11

About C header files of C programming

Answers

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

Which increment operator does not exist in python

Answers

Python does not have a unary increment operator such as "++". In Python, increments are performed using the "+=" operator.

In Python, there is no "++" increment operator, which is commonly used in some other programming languages such as C, C++, and Java. In Python, the usual increment operator "++" does not exist and will result in a syntax error if used. Instead, Python provides a shorthand for incrementing a variable by a certain value, which is the "+=" operator. For example, to increment a variable "x" by a value of 1, you would use the syntax "x += 1" in Python. This is known as the "in-place addition" operator and is the preferred way to increment a variable in Python. Python follows a different syntax and coding style compared to other programming languages, and understanding the specific features and limitations of Python is important when working with it in a programming context.

To learn more about operator; https://brainly.com/question/4721701

#SPJ11

PLZZZ HELP
Escaping Literal Quotes in Strings (JavaScript)
first pic is instructions
second pic is the code I have
Also, please provide feedback on the code I have.
WILL GIVE BRAINLIEST'
WILL REPORT ALL SCAMS

PLZZZ HELPEscaping Literal Quotes in Strings (JavaScript)first pic is instructionssecond pic is the code
PLZZZ HELPEscaping Literal Quotes in Strings (JavaScript)first pic is instructionssecond pic is the code

Answers

Answer:

If you just want to escape string literals, here are the ways to do it. There are at least three ways to create a string literal in Javascript - using single quotes, double quotes, or the backtick (). So, if you enclose your string in single quotes, no need to escape double quotes and vis versa.

Explanation:

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

what is the decimal value of the largest magnitude positive two's complement binary number that can be represented using 5 bits? (note: we are asking for the largest magnitude number, not the magnitude of that number.)

Answers

1 1111 is the greatest 5 digit binary number and the decimal number 31. The following number is 10 000, which equals 25 or 32.

From right to left, the binary digits or bits begin counting 0 or 1 times 210 or 1. 1000 is a binary number with a value of 23 or 8. Four binary digits are frequently represented by one hexadecimal digit, which can be any integer from 0 to 9 and any letter from A to F. (10 to 15). 11 1111, for example, is 3F in hexadecimal, while 1 1111 is 1F.

However, because digital systems function with binary numbers that are expressed in terms of "0's" and "1's," there is no facility in digital circuits to add a plus or minus sign to a number. When used together in microelectronics, these "1's" and "0's," known as bits (a contraction of BInary digiT), fall into different range sizes of numbers known by common names such as a byte or a word.

We've also seen that an 8-bit binary number (a byte) can have a value ranging from 0 (000000002) to 255 (111111112), implying that there are 28 = 256 distinct combinations of bits that make up a single 8-bit byte. For instance, an unsigned binary integer like 010011012 = 64 + 8 + 4 +1

In decimal terms,   7710. However, digital systems and computers must be able to handle and manipulate negative numbers in addition to positive integers.

Learn about microelectronics from here;

https://brainly.com/question/27948744

#SPJ4

what is role can ICT play in helping school take part in social responsibility

Answers

Answer:

The answer is below

Explanation:

Given that Social responsibility deals with ideas that individuals or groups of people are expected or bound to work in alliance with other individuals or groups of people in favor of the generality of society.

Hence, some of the role ICT can play in helping school take part in social responsibility are:

1. Helps students to have independent access to knowledge

2. It assists the students with special needs

3. It helps the teachers to teach outside the comfort of the classroom only.

4. It exposes teacher and students to more knowledge and opportunities

5. The school governing body can access people and the community's opinions about ways to improve the school better.

6. It exposes the school to more ideas and opportunities.

7. It can be used to assist the school in improving the quality of education, both for the teachers and students side.

A workstation at work is found to be unsecured. The account used on the computer does not have a password, the data is not encrypted, and the computer itself is located in an area with easy access. This particular workstation contains personal information about its customers. In regards to the regulation of data, which is being compromised?
A) PII
B) PHI
C) PCI
D) GDPR

Answers

PII is being compromised Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.

What is meant by Encryption of data?Data encryption is a technique for converting plaintext (unencrypted) data to ciphertext (encrypted). The use of an encryption key and a decryption key allows users to access encrypted and decrypted data, respectively. Significant volumes of private data are managed and kept online, either on servers connected to the cloud. Sensitive information should be protected from hackers via encryption, which is a key strategy for both individuals and businesses. Websites that transmit credit card and bank account details, for instance, encrypt sensitive data to guard against fraud and identity theft. Data encryption changes plaintext data from a readable format to ciphertext, an unreadable format. Only once the data has been decrypted may users and processes read and use it. The decryption key needs to be secured against unwanted access because it is confidential.

To learn more about PII  refer to:

https://brainly.com/question/29829548

#SPJ4

Which securities protects networks from intruders? *

Application security
Network security
Information security
Operational security

Answers

Answer:

I think it is network security

Explanation:

Heard in an ad before :T

Answer:

Use Kika Clipboard to make paste easypneumonoultramicroscopicsilicovolcanoconiosis

"describe the behavioral risk factor surveillance system. how does it differ from a surveillance system for infectious disease?"

Answers

The Behavioral Risk Factor Surveillance System (BRFSS) is a program that monitors behavioral risk factors for chronic diseases such as heart disease, diabetes, and cancer.

It collects information through telephone surveys and asks questions about lifestyle habits, such as smoking, physical activity, and nutrition. This information is used to identify trends and risk factors in the population and to develop interventions to improve health outcomes.

In contrast, a surveillance system for infectious diseases monitors the spread and occurrence of infectious diseases in a population. It collects data on the incidence and prevalence of diseases, as well as demographic and clinical information about the affected individuals. This information is used to identify outbreaks and to inform public health responses, such as vaccination campaigns and disease control measures.

The key difference between the BRFSS and a surveillance system for infectious disease is the focus of their data collection. While the BRFSS gathers information on behavioral risk factors for chronic diseases, an infectious disease surveillance system focuses on the spread and control of infectious diseases.

Learn more about Surveillance here:

https://brainly.com/question/14895186

#SPJ11

Other Questions
WILL GIVE BRAINLIEST!!!!!!!!! American troops on the _______ Peninsula surrendered in April 1942, and although a small force held out on the island of Corregidor in Manila Bay until May, the Philippines fell to the Japanese. * The five forces of Porter's model include the threat of entry and substitutes, rivalry among existing competitors, and the power of ___.a. competitors or rivalsb. complementorsc. suppliers and buyersd. substitutes The letter of representation (representation letter) requested by the auditors to their clients at the end of the audita.it does not reduce the responsibility of the auditor.b.may replace ot Identify the type of mutation that occurred and explain in what way it affected the protien a cylindrical tank with radius 3 m is being filled with water at a rate of 3 m3/min. how fast is the height of the water increasing? What kind of line is line A F? Write a class named Coin, The Coin class should have the following field:*A String named sideUp. The sideUp field will hold either "heads" or "tails" indicating the side of the coin that is facing up.The Coin class also needs these following methods:1) A no-arg constructor that randomly determines the side of the coin that is facing up ("heads" or "tails") and initializes the sideUp field accordingly. What was MOST significant about VE Day in World War II? What are three economic challenges that Americans and Canadians face today? when i take notes what do i write only historywhat are the important thing what i need to write down ? With respect to secure authentication and authorization design, security professionals leverage hardware tokens because they: If you dissolve 50 g of nh4cl at 30 0c, how much nh4cl will be left undissolved or precipitate out of the solution? 50 g 40 g 8 g 5 g 12 g who was head of the executive branch of the federal government under our first constitution, the articles of confederation? in other words, who was president of the united states--the head of the executive branch of government--under the articles of confederation? one study of long-haul truck drivers showed that they were at 23 times greater risk of a collision while texting. this best illustrates the impact of during the light reactions, water is oxidized to o2. where do the hydrogens go? Triangle JKL is isosceles. The measure of angle J is 72 and the measure of angle K is 36. Which statement describes angle L? Angle L is a base angle and measures 36. Angle L is a base angle and measures 72. Angle L is a vertex angle and measures 36. Angle L is a vertex angle and measures 72. the keynesian model of aggregate demand includes:l.government purchases and taxes. ll.consumer spending and investment spending.lll. exports plus imports. based on the book review, in what way did each political party view the Personal Responsibility and Work Opportunity Act? TIMED 30 ptsThe table below shows the freezing points of four substances.SubstanceFreezing point (C)Benzene5.5Water0Butane138Nitrogen210The substances are placed in separate containers at room temperature, and each container is gradually cooled. Which of these substances will solidify before the temperature reaches 0C?A benzeneB waterC butaneD nitrogen