1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neko [114]
4 years ago
6

What do you think about net neutrality??

Computers and Technology
2 answers:
Tomtit [17]4 years ago
6 0
I think net neutrality should be kept! Removing net neutrality is unfair for all those who use the Internet! I think life would change is net neutrality did. Certain websites (a lot!) would slow down and cause a lot of people inconvenience, and I bet we'd have to pay more to use some sites!!!

NET NEUTRALITY SHOULD BE PRESERVED!!!!
n200080 [17]4 years ago
5 0
In my opinion, net neutrality protects internet users and allows freedom and justice in the vast world of the internet. That's the good side. Now, the bad side is that it isn't fair for people who tend to use more internet service than other users. Net neutrality can also cause internet traffic.

<em><u>In my opinion, net neutrality should remain!</u></em>
You might be interested in
Contagem progressiva e regressiva usando estrutura condicional enquanto no visualg
lana [24]
Girls are so evil nowadays
6 0
3 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
Are DHCP messages sent over UDP or TCP? 2. What is the link-layer (e.g., Ethernet) address of your host? 3. What values in the D
maks197457 [2]

Answer:

1.) DHCP is sent over the message at UDP.

2.) The address of link-layer is Source: DellComp_4f:36:23 (00:08:74:4f:36:23)

3.) The message type of value to the discover message is 1, but the message type of value to the request packets is 3. This how you can be differentiate two.

4.) The Transaction ID in first four message is 0x3e5e0ce3

The transaction ID in second sets of messages is 0x257e55a3

The transaction ID is identifies if the message is a part of the set of the messages is related to the one transaction

Explanation:

DHCP is stands for the Dynamic Host Configuration Protocol which is the networks management protocol that is used on the UDP/IP networks where by the DHCP servers dynamically assign the IP address and the other networks configuration parameters to the each devices on the network so they can be communicate with the other IP network.

6 0
4 years ago
Consider the following class declarations.
kow [346]
Override only
Reason because the same method speak is in the parent and child class
5 0
3 years ago
Respond to the following in 2-5 paragraphs. Give an example of how you can demonstrate active listening.
nadezda [96]
Hey my name is ..... and this do the thesis
8 0
3 years ago
Other questions:
  • Write a recursive method public static String reverse(String str) that computes the reverse of a string. For example, reverse("f
    6·1 answer
  • Given two variables hasToner and hasPaper of type bool, that have been declared and given values, write a code block that will o
    15·1 answer
  • Some personal computer manufacturers provide a hard disk configuration that connects multiple smaller disks into a single unit t
    6·1 answer
  • F=M×A<br> What is the acceleration of 50kg object pushed with a force of 500 newton?
    14·1 answer
  • Which feature of a word processing program enables you to represent an text information in the form of a diagram?
    14·2 answers
  • Explain: The fetch part of fetch decode execute cycle
    6·1 answer
  • An unauthorized user is a network _______ issue.
    11·1 answer
  • The Internet is not a good place to connect with people when looking for a job.
    10·1 answer
  • what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
    6·1 answer
  • The hardware and software that must be implemented to support the applications that the primary activities use are a part of the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!