1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
9

Need help ASAP Examples of utilities that make it possible for people to create and share multimedia files include _____. audio

recorders encryptors QuickTime RealPlayer remote controllers video players
Computers and Technology
2 answers:
Minchanka [31]3 years ago
6 0

Answer: the Internet vs. the web

internet: interconnected mesh of computers/data lines that connect millions of people

web: multimedia interface to the resources on the internet

access the internet through

ISP (internet service provider)

browsers

programs that provide access to web resources/allow you to explore the web

URL

uniform resource locator

2 parts of URL

protocol & domain name

top level domain

web suffix, ie. .com .org .net .edu

HTML

hypertext markup language

web utilities

specialized utility programs that make using the internet/web safer and easier

examples of web utilities

plug ins, filters, file transfer utilities, internet security suites

plug ins

programs that automatically start and operate as part of your browser- they provide an enhanced browsing experience by enabling special file formats and multimedia elements like QuickTime, Acrobat, Flash, etc

Explanation:hope this helps stay safe:)

a_sh-v [17]3 years ago
5 0

Answer:

Prototype

I think this is the word ur looking for!

You might be interested in
The computer stores a program while the program is running, as well as the data thatthe program is working with, in _____.
kenny6666 [7]

hard drive is wht the awnser is

8 0
3 years ago
Which of the following is the term for software that automatically displays or downloads unwanted offers?
slega [8]
Adware. Adware displays ads and popups. The other options are completely different from each other
5 0
3 years ago
In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
emmainna [20.7K]

This idea is most closely related to the Layering in terms of how to reduce complexity.

<h3>Describe cybersecurity?</h3>

The term "cybersecurity" refers to the safeguarding of computer systems and networks against the leakage, theft, or destruction of data as well as the interruption of the services they offer.

Defense in depth is a technique used in cybersecurity that is one of the greatest ways to safeguard a computer or network. If one fails, it's likely that another will identify the issue. The approach to simplifying that is most in line with is called layering.

Thus, This idea is most closely related to the Layering in terms

For further details about cybersecurity, click here:

brainly.com/question/13016321

#SPJ1

5 0
2 years ago
Read 2 more answers
Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
laila [671]

Answer:

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

Explanation:

Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?

a. Test Sandbox

c. Test Sandbox

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

From the question, we are informed that Universal Containers wants to use a sandbox with real data in it. In this case I will recommend Full Sandbox, Partial Sandbox and Developer Pro.

Sandboxes. In cybersecurity sandbox can be explained as security mechanism that is utilized to separate running programs, and this is an effort utilized to curb system failure as well as software vulnerabilities to disperse.

Sandboxes are crucial when executing suspicious code, it helps to do this so that the host device is is not put to risk of harm. Since, Containers wants to use a sandbox with real data in it then the three types of sandboxes can be use.

✓Full sandboxes allows performance testing as well as staging it can be regarded as copy of production org, and these can be objects attachment and others

✓Partial Copy Sandbox can be allows copying of configuration and part of one's data, in order to allow new configuration testing with one's real data.

5 0
3 years ago
An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
Elden [556K]
The answer to this question is A
7 0
3 years ago
Read 2 more answers
Other questions:
  • What Event is called when an Object collides with an non-trigger collider?
    13·1 answer
  • Question 2 (2 points)
    9·1 answer
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.A. Thro
    15·1 answer
  • Casey, a woodworker, is developing his own website. He plans to use the site as a means of selling his handmade furniture. While
    10·1 answer
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    13·1 answer
  • Hydraulic systems use liquids because _____.
    14·2 answers
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • Which type of document should Omar print?
    5·2 answers
  • From which country samsung is​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!