1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
4 years ago
10

HELP PLEASE!!!!!!!!

Computers and Technology
1 answer:
ASHA 777 [7]4 years ago
6 0

Answer:

the answer is D. Content filter

An IT Professional may implement a content filter to protect the user from sites that seem questionable. (Mainly being offensive, inappropriate, and even dangerous for the user.)

I hope my answer came in handy! <3

You might be interested in
Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage informati
saveliy_v [14]

Answer:

Embedded Systems.

Explanation:

Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as Embedded Systems.

6 0
3 years ago
Programming: Write a recursive function to_number that forms the integer sum of all digit characters in a string. For example, t
scZoUnD [109]

yes

Explanation:

isn't really noted but if the sequence is in the given order the ("3at4") could be expressed in a ('0' to '9' )format

7 0
3 years ago
Which of the following is a sample IPv4 address?
const2013 [10]

Answer:

The first one, 99.14.242.51 is the only valid IPv4 address listed.

Explanation:

An IPv4 address is formatted as four eight-bit numbers separated by decimals. This means that a valid one will have four numbers from 0 to 255, with decimals in between.

The first one, 99.14.242.51 is a valid IPv4 address.

The second one has the number 342, which is greater than eight bits.

The third one has five octets.

The fourth one is in the wrong format altogether, using what appear to be 32-bit numbers

7 0
3 years ago
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
i have a class for computers and i need a free hardrive are there any websites that give me one for free in 3 days??​
vagabundo [1.1K]

Answer:

I don't think so bud that's not how it works lol

6 0
4 years ago
Other questions:
  • ________ viruses are often transmitted by a flash drive left in a usb port.
    8·1 answer
  • Two circuits are created using two identical light bulbs. In the circuit A, the bulbs are hooked up in series. In circuit B, the
    7·2 answers
  • To adjust the margins on a page, users will navigate to the _____ tab.
    13·2 answers
  • How do i recover a google account that was deleted?
    7·1 answer
  • What law made it illegal to spread contraceptive information and devices?
    6·1 answer
  • A __________ is a repository of data gathered from operational data and other sources that is designed to serve a particular com
    7·1 answer
  • 2y/3 - y-1/6 + 7y-1/4 = 2 1/6​
    5·1 answer
  • Which command will provide us with a list of the available internal commands (commands that are part of Command Prompt, such as
    7·1 answer
  • How do I mark brainlyist
    7·2 answers
  • How to get an object from a container in java.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!