1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
4 years ago
14

The correct or acceptable way of communicating on the internet is known as

Computers and Technology
1 answer:
stepladder [879]4 years ago
8 0
I want to say e-mail.

You might be interested in
Types of network model​
dexar [7]

Answer:

OSI Model and TCP/IP Model

Explanation:

4 0
3 years ago
What process identifies and grants access to a user who is trying to access a system? A. Credibility
xeze [42]

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
8 0
3 years ago
Janet has to create a web page for a software company that should be accessible from both desktop computers and mobile devices.
kenny6666 [7]

create a responsive website which adapts to every screen/devices. Answer is B.

3 0
3 years ago
Read 2 more answers
Fill in the blank with the correct response.
andrew11 [14]

Answer:

entertainment.

Explanation:

i dunnoif it is right, but I would put this.

4 0
2 years ago
The _______ of the story describes the events that takes place as well as the conflict or problem that must be resolved.
Crank

Answer:

The answer is C the plot.

7 0
3 years ago
Other questions:
  • Which of the following describes a Trojan horse?
    11·1 answer
  • Documenting Business Requirements helps developers control the scope of the system and prevents users from claiming that the new
    13·1 answer
  • Simplify the expresion<br>12. 12g + 9g​
    13·1 answer
  • Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
    6·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • Guys I need help I cant download anything in the app store I restarted my phone and I know it's not the space on my phone I have
    13·1 answer
  • A(n) __________ prevents outsiders from accessing corporate information the user does not want others to see.
    9·1 answer
  • Explain the principles of computer applications ​
    11·1 answer
  • WHAT DOES THE SCRATCH CODE BELOW DO?
    6·1 answer
  • Write a C++ function with the following signature: void readAndConvert() The function takes no parameters and returns no value.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!