1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
3 years ago
5

Do you think that google should comply with government that request a takedown of certain content? Why or why not?

Computers and Technology
2 answers:
ycow [4]3 years ago
4 0
Yes, the government has control and if they don't then they will get taken down themselves.

JulsSmile [24]3 years ago
3 0
No because if google allows those specific things the government should leave it alone
You might be interested in
Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit do
bekas [8.4K]

Answer:

Check button under error checking

Explanation:

Under the Tools tab there are two options:

Error checking and Optimize and defragment drive option.

clicking the check button with administrative permission under error checking option will examine the hard drive for errors.

3 0
3 years ago
Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture
lara31 [8.8K]

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

<h3>How does SaaS (Software as a service) impact organizational security posture?</h3>

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

<h3>What is organization level security in Salesforce?</h3>

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

brainly.com/question/24852211

#SPJ1

4 0
2 years ago
Password ____ traverse the network searching for passwords from remote authentication systems.
irga5000 [103]

The correct answer is scanners.

<h3>what is password?</h3>

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

When a password contains more than one word, it may be referred to as a passphrase. When a password contains solely digits, such as a personal identification number, it may be referred to as a passcode or passkey (PIN).

learn more about password refer:

brainly.com/question/15569196

#SPJ4

3 0
2 years ago
Q#3. What are the advantages and disadvantages of Analog and Digital computers?​
Pie

Answer:

Advantages of Analog computers:

  • Many data parameters can be obtained concurrently in a simultaneous and real-time procedure.
  • Certain operations can be computed without the need of converters to transform the inputs and outputs to and from digital digital mode.
  • The developer must scale the problem for the computer's dynamic range during configuration. This might provide insight into the issue as well as the consequences of numerous faults.

Disadvantages of Analog computers:

  • Computer systems can handle greater issues for a certain efficiency and power usage.
  • Solution arise in real or delayed time, and recording them for subsequent use or investigation might be problematic.
  • The number of temporal variables that can be used is restricted. It's tough to correctly solve problems with elements that operate on radically various time periods.

Advantages of Digital computers:

  • It is a lot more efficient and more effective, particularly with today's computers, which can analyze information at a billion times the rate of a human.
  • Modern digital computers' incredible speed enables them to recreate objects in real time, resulting in new experiential characteristics of digital computers, such as interactive media.
  • It has the ability to convey information in a very brief manner. This enables data storage and transmission to be more efficient as digital systems are extremely dependable and controllable.

Disadvantages of Digital computers:

  • To complete the same tasks, digital computers need more power than analog computers, resulting in greater heat, which increases the complexity of the computer and necessitates the usage of heating elements.
  • To convey the same amount of data, digital computers require more capacity than analogue computers.
  • The detection of digital computers necessitates synchronization of the computer system, which is not always the scenario with analogue computers

5 0
2 years ago
Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re
Neporo4naja [7]

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

5 0
4 years ago
Other questions:
  • Witch printer covers a large range of colors than any other printer does
    15·2 answers
  • A firewall can consist of all devices positioned on the network _____________.
    14·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • The Business Cycle rises and falls. The highest point of the Business Cycle is known as the __________.
    7·1 answer
  • During flashbacks you experience______.
    14·2 answers
  • EASY POINTS
    5·1 answer
  • You have the following code: string name; cout &lt;&lt; "Enter your name : "; cin &gt;&gt; name; If a user enters "Mary Smith" a
    10·1 answer
  • Careers on the largest declining industries list will see an increase in the number of employees in their workforce.
    15·1 answer
  • Alcohol first impairs your ____?
    12·2 answers
  • Please help thank you !!!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!