1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
3 years ago
10

What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground

subcultures? * a. Surface Web b. Deep Web c. Dark Webd. Crypto-Net
Computers and Technology
1 answer:
kotykmax [81]3 years ago
6 0

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

You might be interested in
Who would win in a fight iron man or bat man​
MatroZZZ [7]
IRON MANNNN MARVELLLL
8 0
3 years ago
Read 2 more answers
If a class has member variables that are pointers, you must ensure that you implement ____.
DedPeter [7]

Answer:

objects

Explanation:

pointer are used for the objects

5 0
3 years ago
PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
DaniilM [7]

Answer:

1. would be B.

2. would be D

3. May I ask if it can be multiple answers?

Explanation:

1. In coding a if statement has to follow if something is true or not. If we are talking about a if and then statement it will skip that block and move to the next block of the "then" part of the "if then" Statement if the first part is reported false

2. This is a easy one, so it has to be either a 3.25 GPA or higher or they have to have either 100 hours or more.

3. waiting for a comment back :)

4 0
4 years ago
. Network navigation devices, such as routers, help datatravel in bundles that are referred toas………..
nataly862011 [7]

Answer: packets

Explanation:

Network navigation devices, such as routers, help data travel in bundles that are referred to as packets. As, networks that transfer the data in small packets are known as packet switching network and that packets carry the data using the internet and the protocol and each of the packet contain some information and data to navigate.

3 0
3 years ago
A persons decision to take action without being asked is
Nimfa-mama [501]

Answer:

Initiative

Explanation:

Initiative: the power or opportunity to act or take charge before others do.

5 0
4 years ago
Other questions:
  • How long does it take to wire a house?
    14·2 answers
  • Please answer this I know that no one else does but I can't think right now
    10·1 answer
  • Please Help!! How to code this in Python?
    11·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • A strategic information system can be any kind of information system that uses information technology to help an organization __
    11·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • What is a trojan horse
    8·2 answers
  • What are the significances of blogs?
    7·2 answers
  • List out any four hardware and software components required for multimedia​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!