1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
3 years ago
12

Which of these statements most accurately describes cookies?They have the capability to execute malicious software.Each cookie f

ile takes up a large amount of file space.They are small text files placed on a computer by a Web site.They can search for personal information on your hard drive.
Computers and Technology
1 answer:
Rasek [7]3 years ago
6 0
Answer is "They are small text files placed on a computer by a Web site."

Cookies are small text files put onto your computer and contain <span>data specific to a certain client and website</span>
You might be interested in
You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as
Rom4ik [11]

Answer:

Transport Layer                                    

Explanation:

  • Transport layer is responsible for correcting data transmission errors which is done by requesting retries also called re-transmission of packets in case of data loss or corrupted data.
  • Transport layer ensures end to end delivery of data making sure that the data is received correctly and in same order in which it was sent.
  • Transmission Control Protocol (TCP) is a protocol in this layer that continues to transmit data packets securely from sender to receiver, identifying packet losses.
  • Transport layer works on packet loss issues and corrects data transmission errors.
  • It has flow control and error control services manage data transmission rate and ensures data is received without error.
  • So in case of transmission errors and re-transmission requests transport layer should be investigated.
5 0
3 years ago
Which Boolean operator enables you to exclude a search term?
Marysya12 [62]

Boolean Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search.

The NOT Boolean operator enables you to exclude a search term. Correct answer: A  The NOR operator excludes words from the search  and by doing that it narrows the search, telling the database to ignore some concepts.

7 0
3 years ago
Read 2 more answers
How can you ensure that the website you are using is secured?
poizon [28]
By having the lock by the website address
3 0
3 years ago
Pls help me computer science discoveries
lara31 [8.8K]

Answer:

jdinwoahdjsioadjsakodsiaohdeioajfnsohfujkdshksyfneowjdfikdjiadjsadhnsuidghaiudbnha

Explanation:

3 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Other questions:
  • A suspension system that allows one wheel to move up and down with minimal effect on the opposite wheel is called what? A. Stabi
    14·2 answers
  • Which is an example of withholding you might see on your pay stub
    14·2 answers
  • Heavenly bodies formed because of gravity<br><br> T or F
    10·1 answer
  • What product category does the brand fit into?
    7·1 answer
  • Which of the following are not deducted on a typical pay stub
    12·1 answer
  • How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i &lt; months) { futureValue = fu
    12·1 answer
  • -How long does a copyright last?
    6·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • The Internet:
    12·1 answer
  • What is the first thing you should do when you open a savings account
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!