1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
2 years ago
13

Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.

Computers and Technology
2 answers:
mixer [17]2 years ago
7 0

Answer:

- limit access to digital information

- surveil people’s digital behavior

- manage the internet

Explanation:

Digital censorship is the act of filtering out information and hiding it from the masses. This is accomplished by limiting access to information and managing the internet. They can also utilize automated, intelligent systems to surveil the digital behavior. (correct on Edge)

I hope this helped!

Good luck <3

emmasim [6.3K]2 years ago
6 0

The surveil of people’s digital behavior, providing efficient internet searches, and promoting access to information are correct.

<h3>What are intelligent systems with big data storage?</h3>

Based on artificial intelligence and intelligent systems, science and technology regarding the gathering, organizing, and analyzing large data to identify patterns, knowledge, and intelligence, as well as other information inside the big data.

Digital censorship uses automated, intelligent systems with big data storage to surveil people’s digital behavior, provide efficient internet searches, and promote access to information.

More about the intelligent systems with big data storage link is given below.

brainly.com/question/14448536

#SPJ1

You might be interested in
What is a variable?
aleksandr82 [10.1K]
Answer. D: a value that looks loads when the program runs.


Explanation:

In programming, a variable is a value that can change, depending on conditions or on information passed to the program. Typically, a program consists of instruction s that tell the computer what to do and data that the program uses when it is running.
5 0
3 years ago
Why was the microchip essential to improving computers?
-BARSIC- [3]
Because it downsized the scale of the computer itself.

5 0
3 years ago
i was playing a mobile game and I was a guild leader in there. one of the members were very disrespectful and they just left bec
Sonbull [250]

Answer:

which mobile game? Whatever the worst thing you can do is. If its slurs and harassment or bullying report them

Explanation:

3 0
3 years ago
Read 2 more answers
If a hacker can steal your passwords by installing malware that captures all the messages you type, what kind of malware did the
Free_Kalibri [48]
Keylogger, or Spyware
4 0
3 years ago
Read 2 more answers
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
Other questions:
  • Select the proper ergonomic keyboarding techniques.
    15·2 answers
  • Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage informa
    12·1 answer
  • Implement the function:
    6·1 answer
  • The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
    9·2 answers
  • What are 2 plants that grow best in our soil type ​
    9·1 answer
  • Which of the following statements is not true? Question 16 options: a) SQL is the most popular query language used for interacti
    10·1 answer
  • How much is a stock supra 1998​
    15·1 answer
  • Which shot is not the best for a widescreen image
    11·2 answers
  • An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to t
    7·1 answer
  • Write a boolean expression that is true if s references the string end.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!