1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
2 years ago
11

Government entities may pressure upstream Internet service providers to _____. a. track and monitor the Internet activities of i

ndividuals b. accept defamation or copyright infringement claims c. immediately take down particular hosted material d. deregister domains because of their hosted content
Computers and Technology
1 answer:
koban [17]2 years ago
6 0

Explanation:

The graph of y = √x is reflected in the y-axis, is horizontally stretched by a factor of 2, shifted 3 units up and 1 unit left. What is the equation of the transformed graph?

Original: y = √(x)

Reflected in the y-axis: y = √(-x)

Horizontally stretched by a factor of 2: y = √(-x/2)

Shifted 3 units up: y = 3 + √(-x/2)

And 1 unit left: y = 3 + √(-(x+1)/2)

You might be interested in
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
4. Write a program to calculate square root and<br>cube root of an entered number .​
nataly862011 [7]

Answer:

DECLARE SUB SQUARE (N)

CLS

INPUT “ENTER ANY NUMBER”; N

CALL SQUARE(N)

END

SUB SQUARE (N)

S = N ^ 2

PRINT “SQUARE OF NUMBER “; S

END SUB

3 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
____________ is the ability to stand up for your own interests and to ask for what you want. A. Discipline B. Arrogance C. Asser
devlian [24]
C. Assertiveness. Assertiveness is defined as confident and forceful behavior, so it is the only one that makes sense.
8 0
3 years ago
Read 2 more answers
Create a function called howManyUntil(stopNum) where stopNum is an integer from 0 and 99
uysha [10]

Answer:

i dont get it

Explanation:

6 0
3 years ago
Other questions:
  • Which passage form the passage best contributes to elisa impatient tone
    8·1 answer
  • Write a MATLAB script that prompts the user to input the following array by providing an example in the prompt: [2 4;6 3;5 9]. C
    15·1 answer
  • How to run android apps on a chromebook?
    15·1 answer
  • Order the steps for accessing the junk email options in outlook 2016
    14·1 answer
  • 3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
    11·1 answer
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    7·2 answers
  • What is the difference btween a microcontroller a mini computer?
    15·2 answers
  • Eating food while drinking speeds up alcohol<br> absorption.<br> True<br> False
    5·2 answers
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
  • Which of the following is a type of input device?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!