1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
8

Who does COPPA protect?

Computers and Technology
2 answers:
Juliette [100K]3 years ago
5 0

Answer:

COPPA(Children's Online Privacy Protection Act) was the act introduced in the year 1998, which was made for the online privacy regulations of the children who were under the age of 13 years.

COPPA was made for the protection of the children from being abused and humiliated through the means of online sources. COPPA is also governed by the Federal trade commission and helps to protect it

coldgirl [10]3 years ago
4 0

Children.

cough to destroy cough everything they love cough cough

You might be interested in
24/3*2^2/2*3+(20-10)-40
ycow [4]

Answer:

34

Explanation:

You use pemdas

8 0
3 years ago
How much longer is the Anping Bridge than the walkway over the hudson
Zepler [3.9K]
Answer: Walkway Over the Hudson, a bridge that crosses the Hudson River in Poughkeepsie, is 2.063 kilometers long. Anping Bridge, which was built in China 850 years ago, is 2.07 kilometers long.

HOPE IT HELPED:)
4 0
3 years ago
What is cloud computing?
Luba_88 [7]
According to google, cloud computing. <span>the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.</span>
4 0
3 years ago
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
How to fix the Run Time ERROR 3706 provider cannot be found? in ACCESS 2007
Nikitich [7]
A you are out of date

B re-install the application and reboot your computer
4 0
3 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    13·2 answers
  • Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
    14·2 answers
  • Pictures that you can click on to tell your computer what to do.
    12·2 answers
  • Pls help I will give lots of points
    9·1 answer
  • What in the world is this for and how do you use it
    8·2 answers
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • Add the following method to the Point class: public double distance(Point other) Returns the distance between the current Point
    12·1 answer
  • WAFL (write-anywhere file layout) Select one: a. is a distributed file system b. is a file system dedicated to single user opera
    6·1 answer
  • Use the drop-down menu to complete the steps for using the Goal Seek feature.
    13·2 answers
  • State four input device that are used for playing gaming programs​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!