1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
11

Computer safety control settings are most often used to

Computers and Technology
2 answers:
Vikentia [17]3 years ago
6 0
I believe its to block harmful content
Stells [14]3 years ago
6 0

Answer:

Protect Children

Explanation:

Computer safety control settings is a tool that Windows offers for parents to restrict usage of the computer to their children's accounts.

They can limit the websites allowed to navigate, set age level for the content displayed, define time ranges of computer time, and block specific applications.

Regarding to Hacking attempts, harmful content or cure viruses, these functions must be performed by a different software, like a Firewall and/or AntiVirus.

You might be interested in
Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a use
Umnica [9.8K]

Answer:

The answer is "True".

Explanation:

The web beacons are one of the different techniques, that are used on web pages and emails, to check whether a user has access to some unobtrusively. It is a line, that is often invisible, and typically does not exceed 1 pixel.

  • It is usually used with cookies.
  • It is also known as a small graph, which generates a request to the server for tracking service.
7 0
3 years ago
Which list method allows elements in a sequence to be removed and added at either end of the structure?
Amanda [17]

Answer:

b) queue

Explanation:

Queue is also an abstract data type or a linear data structure, just like stack data structure, in which the first element is inserted from one end called the REAR(also called tail), and the removal of existing element takes place from the other end called as FRONT(also called head).

4 0
3 years ago
Read 2 more answers
The following code will create a zombie child process because the child process is terminated and the parent process is busy in
Georgia [21]

Answer:

what on earth

Explanation:

5 0
3 years ago
Can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and commun
nlexa [21]

Answer:

Internet

Explanation:

just took the test and got A

7 0
3 years ago
If a node has a wireless connection to the internet, does that node have to be mobile
Marizza181 [45]
No it does not . answers
8 0
3 years ago
Other questions:
  • What is Software? Write the functions of Software?​
    11·1 answer
  • Which of the following operating systems is able to join a domain a) Microsoft office pro b) Microsoft surface R.T. c) google an
    9·2 answers
  • What is the difference between an internal and an external method call? In what situation would only internal calls be needed?
    11·1 answer
  • What technique involves graphical methods and nontechnical language that represent the system at various stages of development a
    14·1 answer
  • Select the correct answer.
    9·1 answer
  • "To speed up magnetic hard drive performance , ___________ is often used. "
    15·1 answer
  • 3.5 code practice question 1
    5·2 answers
  • The microprogram counter (MPC) contains the address of the next microcode statement for the Mic1 emulator to execute. The MPC va
    12·1 answer
  • I need subscribers plz ​
    15·2 answers
  • TO Cloud
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!