1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
11

Which of the following is a term used for the permanent record of activities performed on the Internet?

Computers and Technology
1 answer:
Rasek [7]3 years ago
6 0

Answer:   Your history and you can check everything using a MAC or IP password

You might be interested in
There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
GarryVolchara [31]

The potential risks that is linked with the use of internet as a resource point is known to be copyright infringement.

<h3>What is Copyright infringement?</h3>

This is known to be the creation of a book or any other resource material that has been copyrighted and protected without taking the granted permission of the copyright holder who is found to be the author of the work.

Note that The potential risks that is linked with the use of internet  resource point is known to be copyright infringement and one can be punish for it.

Learn more about copyright infringement from

brainly.com/question/14855154

#SPJ4

6 0
2 years ago
The information that’s displayed in a datalist control is defined by _____.
Olin [163]
The information that’s displayed in a datalist control is defined by templates.
4 0
2 years ago
Which type of address is used on the Transport Layer of the OSI Model to identify the receiving application?
Marianna [84]

Answer:

Port Number

Explanation:

In the transport Layer of the OSI Model the port number is used to identify the receiving application. Temporary communication sessions are set up that enable data exchange, the two protocols used are Transmission Control Protocol(TCP) and the User Datagram Protocol(UDP) . Each port is assigned a number that identifies it according to its function. The range for some well-known ports is 0-1023.

5 0
3 years ago
The variable strFirst's scope is _____.
sp2606 [1]
Pretty sure it’s d, hope this helps
3 0
2 years ago
"What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essential
Drupady [299]

Answer:

i think phone

hope this helps u stay safe

Explanation:

4 0
3 years ago
Other questions:
  • What does a network backbone do? allows data to be delivered more quickly and efficiently makes data transfer from the cloud mor
    14·2 answers
  • Thinking actively promotes critical thinking. Explain how thinking actively promotes critical thinking
    10·1 answer
  • Chill and text part 2<br><br> (TEST) How do i copy apex questions
    10·2 answers
  • In the Mouse Properties window, you can
    6·1 answer
  • Write switch-case statement that displays the following information if the temperature is the input Activities at Lake LazyDays
    13·1 answer
  • Riya wants to save her project work in an external device so that she can show it to her class teacher. Help her to choose the d
    13·2 answers
  • The scene of a human sitting at a computer terminal, responding to stimuli flashed on the computer screen, would most likely be
    7·1 answer
  • What are the words that make up a high-level programming language called?
    6·1 answer
  • URGENT HELPP<br> WILL MARK BRAINLIST
    6·1 answer
  • What options are available for storing backups, physically?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!