1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
6

As the internet continues to expand and become vital to everyday life, it may become more regulated with rules just like our eve

ryday, real-world laws. of the following choices, which one is a possible netiquette system for the future?
a. all capitals will become the preferred way to write online.
b. the same system will remain in place even as the internet continues its expansion.
c. the government will collect taxes by charging money to view each website.
d. a temporary suspension from ...
Computers and Technology
2 answers:
ololo11 [35]3 years ago
8 0

Answer:

The answer is D.

denis23 [38]3 years ago
5 0
I can't see all of option D, but it is potentially correct. Please tell me what option D is and I will tell you if it is option "B" or option "D."
You might be interested in
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
4 years ago
Read 2 more answers
Q13. On which option do you click to
fredd [130]

Answer:

The answer is "Home cells Or Home Tab".

Explanation:

The Excel Home Tab is also known as the home cell, it also is used to execute the standard commands like bold, highlight, copy/paste. It also uses templates in a worksheet for cells, which is used to Insert and Delete Cells, and the wrong cell can be defined as follows:

  • In choice Formulas cell or Tab it is used to add the formula, that's why it is wrong.
  • On the choice page cell or Tab is used to view the data, that's why it is wrong.
5 0
3 years ago
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs
Alla [95]

Answer:

The answer is True

Explanation:

Switches are responsible for connecting computers within a network and it belongs only to its local network. Its responsibility is to filter and forward packets between LAN segments. They operate on layer two (2) and sometime layer three (3) of the OSI Model.

Routers on the other hand, are responsible for the interconnections of two or more networks. They forward data packets between networks. They reside at gateways, exactly where two or more networks connects. And they use communication protocols to effectively and efficiently communicate among two or more host.

7 0
3 years ago
Select the correct answer.
S_A_V [24]
I think the answer is b
5 0
3 years ago
If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is ca
Luda [366]

Answer:

Software as a Service (SaaS)

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service. Therefore, if you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a Software as a Service (SaaS) application.

Some examples of SaaS applications are Salesforce, Google apps, Bigcommerce, Dropbox, Slack etc.

8 0
3 years ago
Other questions:
  • A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da
    10·1 answer
  • What are the main types of computer software?
    5·2 answers
  • Constantine forms the following hypothesis. Let n be any non-negative number that meets the following condition: when n is divid
    10·1 answer
  • GAMES Which is better Roblox or BattleCamp Basically Free Points But Please Answer
    7·2 answers
  • X = 0
    15·1 answer
  • Often used in connection with a business
    6·1 answer
  • When referring to hard drives, access time is measured in
    11·1 answer
  • If you answer I will mark brainliest!!! I want to be able to see two websites on my screen at the same time, how do I do that on
    9·1 answer
  • Jose would like to have text with predefined styles that can flow around an image in a variety of shapes and sizes
    10·2 answers
  • When did time begin?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!