1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
13

Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.

Computers and Technology
2 answers:
mixer [17]3 years ago
7 0

Answer:

- limit access to digital information

- surveil people’s digital behavior

- manage the internet

Explanation:

Digital censorship is the act of filtering out information and hiding it from the masses. This is accomplished by limiting access to information and managing the internet. They can also utilize automated, intelligent systems to surveil the digital behavior. (correct on Edge)

I hope this helped!

Good luck <3

emmasim [6.3K]3 years ago
6 0

The surveil of people’s digital behavior, providing efficient internet searches, and promoting access to information are correct.

<h3>What are intelligent systems with big data storage?</h3>

Based on artificial intelligence and intelligent systems, science and technology regarding the gathering, organizing, and analyzing large data to identify patterns, knowledge, and intelligence, as well as other information inside the big data.

Digital censorship uses automated, intelligent systems with big data storage to surveil people’s digital behavior, provide efficient internet searches, and promote access to information.

More about the intelligent systems with big data storage link is given below.

brainly.com/question/14448536

#SPJ1

You might be interested in
Apple's macos and microsoft windows are examples of ________ software. select one:
Soloha48 [4]
D.operating system
mac is an unix based os
3 0
3 years ago
After making a PowerPoint presentation about a new line of clothing designs, Henri notices that he used the word “gorgeous” on n
sineoko [7]

The spell checker and thesaurus are not underneath the view tab, so 1 and 2 are wrong.

If you replace every instance of the word gorgeous, then you would not be adding variety. So d is incorrect.

Therefore:

The only correct answer is C, as it is correct navigation and it adds word variety.

8 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Write query to get the max and min salary of job_id 101​
taurus [48]

Answer:

SELECT  MAX(salary), MIN(salary) FROM salaries WHERE job_id=101

Explanation:

Assumptions were made on the column and table names...

5 0
3 years ago
69.147.76.15 is an example of what?​
Rudiy27

Answer:

IP address.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

Hence, 69.147.76.15 is an example of an IP address.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Generally, when this IP address such as 69.147.76.15 is translated by a domain name system (DNS), it is mapped to the domain name yahoo.com which is much more understandable or comprehensible to the end users.

5 0
3 years ago
Other questions:
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • Which type of peripheral is a keyboard?
    11·2 answers
  • A #1 Phillips screwdriver has a shaft diameter of 
    13·1 answer
  • 1. Which of the following is an example of music piracy? a
    10·1 answer
  • System inputs and outputs are produced at the end of the: A. systems analysis phase of the SDLC. B. systems planning and selecti
    12·1 answer
  • Consider the following code segment.
    12·1 answer
  • Can Any One Marry Baby YODA?
    9·2 answers
  • Which of these parts of a computer produces an observable result?
    11·2 answers
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!