1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
5

January 16, 2018 Q1: This question is worth 99 points and a brainliest. It is a one part question. Medium difficulty.

Computers and Technology
2 answers:
Naddik [55]3 years ago
6 0
Well, some countries think of the Internet like as if it was a weapon. The Internet to them does not seem like what the Internet is to us. Internet features like the Dark Web or Deep web has given them enough reasons on why they should be prohibiting it.
sveticcg [70]3 years ago
3 0

Part 1: In some countries/states, why is it prohibited to have access to the internet? Explain in details why.

Depending on what countries (North Korea for example), it is dangerous to the countries government to allow their citizens to access the internet, because the internet provides a wide-range of information, as well as other political views or opinions, which can help change the view-points of the people. Note that governments want to stay in power, and with changing view-points, they may lose control of their power over the people, and be replaced.

hope this helps

You might be interested in
True or False: When you share something on a friend’s Timeline, only that friend can see it.
katovenus [111]
FALSE because if you share it, the whole network can view it.
5 0
3 years ago
Read 2 more answers
Jerry is making an address book using a digital database. He has a list of his immediate family and friends but wants to add a f
Lana71 [14]

He’d use Microsoft Access to add a list of the parents of his close friends. You can use Microsoft Access and further explore the various functions that this application comes with. Assume that Jerry already has an existing table with a list of his immediate family and friends; he can create two more tables and name them “Friends’ Parents.” This way, he will have the existing fields and the new one.

8 0
3 years ago
Read 2 more answers
How many possible keys does the playfair cipher have? an approximate power of 2
Lorico [155]
I don't know but I am guessing 666 or 777 or 888.
7 0
3 years ago
Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
natita [175]

Answer:

010100000001101000101

Explanation:

When an error occurs in data bits, the SEC code is used to determine where the error took place. 5 check-bits are needed to generate SEC code for 16-bits data word. The check bits are:

C16=0, C8=0, C4=0,C2=0,C1=1

Therefore the SEC code is 010100000001101000101

7 0
3 years ago
Read 2 more answers
Drag the tiles to the correct boxes to complete the pairs.
Gala2k [10]

Answer:

So the first one i think is A. The second is 2, and that i do know

Explanation:

6 0
3 years ago
Other questions:
  • It is used to replace numeric number of a website​
    7·1 answer
  • Develop a Matlab program that allows you to plot the entropy of a source with variable output probabilities. We wish to observe
    8·1 answer
  • What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
    11·1 answer
  • ____ is the official web portal for the U.S. government, providing access to all official U.S. government services and informati
    12·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • 3.19 LAB: Seasons In C++ Write a program that takes a date as input and outputs the date's season. The input is a string to repr
    15·1 answer
  • Which of the following statements holds true for the term plug-in? Group of answer choices It refers to a program (typically a m
    11·1 answer
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
  • At a commercial quick charge station, a fully depleted 87 kwh battery in 2023 ariya can be charged from 20% to 80% in about ____
    10·1 answer
  • A word or phrase to help identify a file when you do not know the file name during the file expiration search
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!