1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
7

Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?

Computers and Technology
1 answer:
Anna007 [38]3 years ago
4 0

Answer:

Internet is the correct answer for the above question.

Explanation:

  • The Internet Explorer define some security zone (which includes the Restricted sites, internet, Trusted sites, and Local intranet) which is used to block the unwanted sites which can be opened by some other websites.
  • When any user use any website, sometimes that websites open different websites. This security zone gives the features to secure the user from this event.
  • There are four-zone which are described in the first line, in which the internet zone is used to take all the websites which are not defined for the other security zone. It means that when any user does not decide the security zone for any websites then by default it comes in the internet zone.
  • This is also asked by the question, Hence "internet" is the correct answer.
You might be interested in
When code is compiled it
lesantik [10]

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

5 0
3 years ago
Read 2 more answers
Which of the following does NOT help a user navigate through a document?
FromTheMoon [43]

Answer:

Navigation Tabs

Explanation:

Navigation tab is used to switch between different pages that are shown in navigation tab. It is not used to navigate through the document.

Scroll bar is used to navigate through the document line by line. It has been shown on the right side of the document to move up and down the page.

Next page and previous page button used to navigate between pages of the documents.

7 0
3 years ago
How to hard reset a iphone 7 without computer
kondor19780726 [428]
You cant go to a specialist if you cannot figure it out or to someone who knows how to hack because the way iCloud is set up you wont be able to unless you can factory reset it by downloading jail break
4 0
3 years ago
Read 2 more answers
Jeff gave a presentation that attempted to convince stockholders to purchase the new software he had developed. What type of pre
Travka [436]

Answer: Progress report presentation

Explanation: Progress report presentation is the presentation that consist the progress report of an individual's work .It describes about the project/work that a person has started to complete the project. These reports are made for the clients, students, colleagues etc.

Progress report in this case is made for the client to make them understand about the Jeff's work , his contribution, changes he invoked in it, achievements ,completion of the project, benefits of it etc. This presentation will encourage the client to buy the software made by Jeff.

7 0
3 years ago
Qual parâmetro é usado é usado na query sql para a presentar os dados em ordem decrescente?Leitura Avançada
nikitadnepr [17]

Answer:

gg

Explanation:

gg

4 0
3 years ago
Other questions:
  • How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
    9·1 answer
  • Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?
    5·1 answer
  • The computer component that makes sure that instructions are decoded and executed properly is the ___________.
    11·2 answers
  • About.com is considered a (an):
    6·1 answer
  • Which of the following is considered part of the process in the systems thinking example of a TPS?
    6·1 answer
  • How is the cia triad used to evaluate encryption methods?
    6·1 answer
  • Which two actions allow the System Administrator to limit Chatter access during roll-out to a subset of Salesforce users?
    9·1 answer
  • Ethics is a way of behaving so that you are
    7·2 answers
  • 1. Implement the function dict_intersect, which takes two dictionaries as parameters d1 and d2, and returns a new dictionary whi
    8·1 answer
  • 4. In Drag and Drop method of Excel , to copy the data , you need to press __________ key while dragging the cells.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!