1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hatshy [7]
4 years ago
11

You can access various sites on the WWW by using hyperlinks or by

Computers and Technology
1 answer:
Tresset [83]4 years ago
5 0
Or by searching up the desired content and or information on a search engine. I believe.
You might be interested in
Kelly completes a bachelor's degree in animation from a top school in New York. She would now like to look for a job that will p
nikdorinn [45]
I believe she would have a best chance in a media production house, animation is a form of media and would be best put to use there.
8 0
3 years ago
Read 2 more answers
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Elizabeth works for a local restaurant At the end of her shift, she is required
eimsori [14]

Answer:

write the time she arrived at the job and the time she left

Explanation:

6 0
4 years ago
Read 2 more answers
Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
mel-nik [20]

Answer:

Digital signature.

Explanation:

Digital signature is used to ensure the integrity and authenticity of a Word document but requires additional services to be available on the internal network.

This is important as it makes sure that the file is authentic and not malware.

3 0
3 years ago
Read 2 more answers
What if an html code became cracked and formed a bug how can i repair that
Valentin [98]
I suggest you look up a video for it ofc
7 0
3 years ago
Other questions:
  • At an open or uncontrolled intersection, yield if ____.
    11·2 answers
  • 5) How have the wireless web and peer-to-peer networking helped small businesses compete with large corporations?
    15·2 answers
  • Which of the following sentences is written in a passive voice
    5·2 answers
  • Given the following code fragment, how many times does the loop body execute? int laps = 50; int myNum = 1; do { myNum = myNum +
    9·1 answer
  • Stuck on where to go with this one.
    15·1 answer
  • The leader of the team wants to do everything him or herself. They have a very big ego and are difficult to work with. What is t
    14·1 answer
  • What is the output of the following code fragment? int i = 1; int sum = 0; while (i <= 15) { sum = sum + i; i++; } System.out
    5·1 answer
  • Corell Inc. has an online tool that offers a wide variety of Corell shoes for direct purchase. The tool even allows customers to
    9·1 answer
  • Special variables that hold copies of function arguments are called _________.
    11·1 answer
  • Which of these did the author use to create certain moods?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!