1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
13

Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.

Computers and Technology
2 answers:
mixer [17]3 years ago
7 0

Answer:

- limit access to digital information

- surveil people’s digital behavior

- manage the internet

Explanation:

Digital censorship is the act of filtering out information and hiding it from the masses. This is accomplished by limiting access to information and managing the internet. They can also utilize automated, intelligent systems to surveil the digital behavior. (correct on Edge)

I hope this helped!

Good luck <3

emmasim [6.3K]3 years ago
6 0

The surveil of people’s digital behavior, providing efficient internet searches, and promoting access to information are correct.

<h3>What are intelligent systems with big data storage?</h3>

Based on artificial intelligence and intelligent systems, science and technology regarding the gathering, organizing, and analyzing large data to identify patterns, knowledge, and intelligence, as well as other information inside the big data.

Digital censorship uses automated, intelligent systems with big data storage to surveil people’s digital behavior, provide efficient internet searches, and promote access to information.

More about the intelligent systems with big data storage link is given below.

brainly.com/question/14448536

#SPJ1

You might be interested in
Each piece of evidence that is collected should be placed in a separate container true or false
alexandr402 [8]
Yes this is true . But evidence is better when it’s true
4 0
3 years ago
You want to substitute one word with another throughout your
Hitman42 [59]
I’m pretty sure it’s “Find and paste”
8 0
3 years ago
What are all the possible 4-digit codes you can make with the numbers 7, 0, 9, and 3?
Arte-miy333 [17]
0,7,0,0
9,9,0,0
7,7,7,7
3,9,0,7

Hope this helps
4 0
3 years ago
Read 2 more answers
Consider a class called Rocket that has a private instance variable called Engine. You are writing a "getter" for the Engine. Us
dusya [7]

Answer:

when user wants duplicate copy of the object

Explanation:

Encapsulation are one of the key foundations of object-oriented programming (OOP). It involves the bundling of data or information with the methods and various techniques which operate on that data.

It can be used in hiding the true values or state of a structured data object that is in a class, preventing unauthorized parties' direct access to them.

The circumstances that can be allowed in returning a reference to the existing Engine is when user wants duplicate copy of the object.

4 0
3 years ago
I need someone's opinion<br> Which format is better? The first or second one? I can't decide 0.0
Ne4ueva [31]

Answer:

2nd one

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • If you were setting up a network with 100 nodes and you wanted no more than 25 nodes per segment: what devices and connections w
    9·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    12·1 answer
  • In order to organize your work effectively on the computer, where is the best place to save it?
    14·2 answers
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • Extend to also calculate and output the number of 1 gallon cans needed to paint the wal. Hint: Use a math function to round up t
    12·1 answer
  • As a prospective student, what is the best reason to request an interview with your college application?
    6·1 answer
  • Consider the following code segment
    15·1 answer
  • ________(fill in the blank)in online education is intrinsically related to equity.
    13·1 answer
  • A block signature indicating that a text message was typed on a mobile device is an example of ____________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!