1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
3 years ago
10

What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground

subcultures? * a. Surface Web b. Deep Web c. Dark Webd. Crypto-Net
Computers and Technology
1 answer:
kotykmax [81]3 years ago
6 0

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

You might be interested in
Desktop publishing design tools are represented by
alina1380 [7]

<span>A. icons.
B. windows.
C. trackballs.
D. modems.</span>

Desktop publishing design tools are represented by <span>icons. The answer is letter A. This is the easiest way to access the design tools when in need.</span>

5 0
3 years ago
Why we use cluster computing and hadoop framework for big data sysetm​
Ber [7]

Answer:

Explanation:

Hadoop clusters can boost the processing speed of many big data analytics jobs, given their ability to break down large computational tasks into smaller tasks that can be run in a parallel, distributed fashion.

5 0
2 years ago
What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
Sloan [31]

Answer:

The correct answer to the following question will be "Data-in-use".

Explanation:

  • Data-in-use is an IT term referring to active information that is usually preserved in a semi-persistent physical state in RAM of computer, CPU registers or caches.
  • It might be created, modified or changed, deleted or accessed via different endpoints of the interface. This is indeed a useful term for IT departments to pursue institutional defense.

Therefore, it's the right answer.

4 0
3 years ago
Choose the term that best matches the definition.
Y_Kistochka [10]

Answer: it’s network protocol

Explanation:

4 0
3 years ago
Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
Setler [38]

Answer:

Option B is Correct.

Explanation:

Thermal paste is used in the CPU motherboard to reduce the heat.

Thermal paste is a heat observing coating that is used to make the system cool when it is heated much by working for a long time.

Thermal paste is also used in heat sink in CPU and CPU passes the air in the heat sink to make the temperature normal.

Thermal paste is very useful which installing any processor otherwise which running, the temperature will be increased in the absence of the thermal paste.

It is used to maintain the empty place between the motherboard and the processor.

7 0
3 years ago
Other questions:
  • This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
    11·1 answer
  • What is the lowest and highest address of a 2^20 byte memory, if it is byte readable.
    11·1 answer
  • Jana works in a call center helping people who are having trouble setting up their
    12·2 answers
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    5·1 answer
  • Sulfur content is measured in
    11·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • A project manager is responsible for (check all that apply)
    13·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
    9·2 answers
  • Part of metacognition involves making a plan to address <br> .
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!