1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korolek [52]
2 years ago
9

State two skills to be used to access information from the internet in order to avoid unwanted materials.

Computers and Technology
1 answer:
Sveta_85 [38]2 years ago
8 0

Answer:

data

Explanation:

faster transmission of data

You might be interested in
What is the command for basic router configuration?
Gre4nikov [31]

Answer:

Step 1 configure terminal Example: Router> enable Router# configure terminal

Step 2 hostname name Example: Router(config)# hostname Router

Step 3 enable secret password Example: Router(config)# enable secret cr1ny5ho

Step 4 no ip domain-lookup Example: Router(config)# no ip domain-lookup

Explanation:

5 0
3 years ago
Fiscal policy includes each of the following except? 1) the money supply. 2) taxes. 3) government spending. 4) the automatic sta
Rasek [7]

The fiscal policy directs the usage of government spending and tax policies to exploit economic conditions, especially macroeconomic circumstances. Fiscal policy includes each of the money supply.

<h3>What does the fiscal policy include?</h3>

The fiscal policy directs the usage of government spending and tax policies to exploit economic conditions, especially macroeconomic circumstances. These contain aggregate demand for goods and benefits, employment, inflation, and economic growth.

Some of the key goals of fiscal policy exist as economic stability, price stability, full employment, optimum allocation of resources, accelerating the rate of economic development, encouraging investment, and capital formation and growth.

Fiscal policy exists as measures employed by governments to stabilize the economy, especially by exploiting the levels and distributions of taxes and government expenditures. Fiscal measures exist frequently utilized in tandem with economic policy to attain specific objectives.

Large-scale underemployment, lack of coordination from the public, tax evasion, and low tax base are the other constraints of fiscal policy.

Therefore, the correct answer is option 1) the money supply.

To learn more about fiscal policy refer to:

brainly.com/question/6583917

#SPJ4

7 0
1 year ago
Give 5 uses of software and hardware.
Annette [7]
Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page is computer hardware. The Internet browser that allowed you to visit this page and the operating system that the browser is running on is considered software.

All software utilizes at least one hardware device to operate. For example, a video game, which is software, uses the computer processor (CPU), memory (RAM), hard drive, and video card to run. Word processing software uses the computer processor, memory, and hard drive to create and save documents.

In a computer, hardware is what makes a computer work. A CPU processes information and that information can be stored in RAM or on a hard drive. A sound card can provide sound to speakers and a video card can provide an image to a monitor. All of this is hardware.

7 0
3 years ago
The thinner the thread on the screw, the ______the force needed but the _____the distance.
WARRIOR [948]

Answer:

decreases, increases

Explanation:

The thickness of the thread decreases the input force or the force needed. And it increases the output force and the distance. So if the thickness is reduced then the input force required is decreased but meanwhile, the distance is increased. And hence the correct option is as mentioned in the answer section.

5 0
3 years ago
The result of processing data ​
Alla [95]

Answer:

Processing and analysis of data inevitably result in a number of edits in the data file. However, it is necessary to preserve the authenticity of the original research information contained in the data throughout the whole data lifecycle. There are many possible types of changes in the data: Data cleaning procedures may be implemented.

Explanation:

4 0
3 years ago
Other questions:
  • When looking at an object or process to code, it is important to think of as general a solution as possible and consider all the
    13·1 answer
  • What is an example of asynchronous communication
    7·1 answer
  • Nonvolatile in the context of data storage means ________________. a. the data can't be changed in a data warehouse. b. the data
    11·1 answer
  • Case project 5-1 Network Integration ​
    5·1 answer
  • Under the Right to Know Rule, employers need to include information on which one of the following in a written and complete haza
    5·1 answer
  • Assume a 16-word direct mapped cache with b=1 word is given. Also assume that a program running on a computer with this cache me
    6·1 answer
  • Match the categories in the first column with examples in the second column.
    14·1 answer
  • 6. When working with a file,
    9·1 answer
  • What is the full form of cpu​
    11·2 answers
  • Can computers be opened from the All programs submenu
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!