1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
7

What keeps unauthorized internet users out of private intranets?

Computers and Technology
1 answer:
Kruka [31]3 years ago
8 0
I think coders put in codes. Sry if that does not help.
You might be interested in
You are the network administrator for a company with a single Active Directory domain. The corporate office is located in Miami
Lubov Fominskaja [6]

Answer: throw your computer out of the window because to hell with this question

Explanation:

4 0
3 years ago
What key is used to create spaces between lines within a document?
Naily [24]

I guess the correct answer is the Enter key

Οn cοmputеr kеybοards, thе еntеr kеy in mοst casеs causеs a cοmmand linе, windοw fοrm, οr dialοg bοx tο οpеratе its dеfault functiοn. This is typically tο finish an "еntry" and bеgin thе dеsirеd prοcеss, and is usually an altеrnativе tο prеssing an ΟK buttοn.

4 0
3 years ago
With a ____ indent, all lines except the first line of the paragraph are indented from the left margin.
hoa [83]

The answer to this question is a hanging indent. A hanging indent is a writing format where in the first line of the text or paragraph is being aligned in the left margin. A hanging indent is also known as the hanging paragraph.  

3 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Online education students need to be taught ______. Select 2 options.
Vladimir79 [104]

Answer:

-the reasons why they should be ethical


-how to communicate professionally

Explanation:

GOT IT RIGHT ON ODYSSEY

6 0
2 years ago
Other questions:
  • Identify the most appropriate way to display the following research data.
    12·1 answer
  • ____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
    12·1 answer
  • A ____________ is a network connection that typically carries encrypted data over the Internet to and from a remote access serve
    13·1 answer
  • . Write a function called is_sorted that takes a list as a parameter and returns True if the list is sorted in ascending order a
    14·1 answer
  • Assume that the int variables i and j have been declared, and that n has been declared and initialized.
    10·1 answer
  • Most operating systems today primarily use a ____.
    12·1 answer
  • Given an initialized String variable outfile, write a statement that declares a PrintWriter reference variable named output and
    12·1 answer
  • How would you assign roles to your group members?
    9·2 answers
  • Define a function that will return the length of a list
    5·1 answer
  • I am trying to sum up a set of data based on 2 criteria (needs to have "green" in column E, and "January 2020" in collum A). Col
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!