1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
8

Which kinds of Internet content do you think you need permission to use? Check all that apply.

Computers and Technology
2 answers:
Leona [35]3 years ago
7 0

Answer:

stories

music

blogs

videos

Explanation:

i took it on edg

Nastasia [14]3 years ago
5 0

Answer:

In my opinion , none. If you are old enough to have a phone and access to internet than none. But if you're young like 11 and below then maybe the videos and blogs and some music.

Explanation:

You might be interested in
Why is storage and important part of the computing process? It must be atleast five sentences.
worty [1.4K]

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

3 0
3 years ago
How do buffers work?
sasho [114]
A buffer is able to resist pH change because the two components (conjugate acid and conjugate base) are both present in appreciable amounts at equilibrium and are able to neutralize small amounts of other acids and bases (in the form of H3O+ and OH-) when the are added to the solution.
5 0
3 years ago
1. What is an object and what does it do?
Reptile [31]

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

Explanation:

3 0
3 years ago
the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives a
Dafna1 [17]

Answer:

Tuning. See explanation below.

Explanation:

Tuning

By definition the tuning is: "the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives."

And this process is the improvement of system performance in computer science. Usually is related to optimization of a process, when we us tunning, we can follow these steps:

a) Identify which numeric values are acceptable and improve the parameters

b) Take a measure for the system originally and without the tunning in order to have an initial comparative measure

c) Understand that each process have a critical path, we need to identify it.

d) Modify parts who not improve the efficiency of the algorithm

e) Check the performace when we apply modifications

5 0
4 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Other questions:
  • Using the bitwise AND operation, the result of 1 AND 0 is ___________. 10100100 ___________ 11010101 = 01110001. A common way to
    15·1 answer
  • ________ viruses are often transmitted by a flash drive left in a usb port.
    8·1 answer
  • By default, windows does not display ____________________ in windows explorer.
    8·1 answer
  • Which of the following tasks would you most likely use a spreadsheet to complete
    15·1 answer
  • Need some personal advice here.
    12·2 answers
  • George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
    6·1 answer
  • Tell me the errors please
    14·1 answer
  • You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
    14·1 answer
  • When streaming video, data is temporarily stored in a
    5·2 answers
  • A customer bought a goods for Rs.9,000 after getting 10% discount. Calculate the marked price of the goods.Write in Qbasic.​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!