1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
14

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not

record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true
Computers and Technology
1 answer:
Nataly_w [17]3 years ago
3 0

Answer:

This question was initially incomplete. Here is the full question:

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

a) The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.

b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

c) A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.

d) A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

The correct answer is b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

Explanation:

For e-commerce sites, shopping cart information are stored as cookies on the visitor's computer such that when the website visitor leaves the website and comes back a few days later, their shopping preferences are remembered.

If the website visitor uses an anonymous window, the cookies created during the browsing session will be deleted when the anonymous website is exited and so, items placed in the shopping cart for future purchase will not be saved.

You might be interested in
what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple system
Karolina [17]
Connections, allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. They do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.
6 0
3 years ago
Create your own unique Java application to read all data from the file echoing the data to standard output. After all data has b
mafiozo [28]

Answer:

<u>Output</u>

The values read are:  

25

3

4

65

7

9

5

6

1

11

10 data values were read

Explanation:

Below is the Java program to read all data from the file echoing the data to standard output and finally displaying how many data were read:-

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

public class MyFileReader {

public static void main(String[] args){

 int num,counter=0;

 File file=new File("numbers.txt");

 try {

  Scanner input=new Scanner(file);

  System.out.println("The values read are: ");

  while(input.hasNext()){

   num=input.nextInt();

   System.out.println(num);

   counter+=1;

  }

  System.out.println(counter+" data values were read");

 } catch (FileNotFoundException e) {

  // TODO Auto-generated catch block

  e.printStackTrace();

 }

}

}

8 0
4 years ago
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
What is technology addiction​
Helen [10]

Answer:

What is the definition of technology addiction?

Technology addiction is defined as the uncontrollable overuse of technological devices including smart phones, computers, and gaming systems. ... Individuals suffering from technology addiction often display both behavioral and physical symptoms.

Explanation:

Technology addiction can be defined as frequent and obsessive technology-related behavior increasingly practiced despite negative consequences to the user of the technology. An over-dependence on tech can significantly impact students' lives.

5 0
4 years ago
Dynamics simulate stillness via calculations performed by the computer.
mash [69]

Answer:

<h3>True</h3>

Explanation:

<h3>The answer is true because...............................</h3>
3 0
3 years ago
Read 2 more answers
Other questions:
  • Tim is trying to explain to his aunt how her computer works, but she does not understand what a CPU does. Which description will
    6·2 answers
  • After typing “application letter” in the Search window in the New dialog box, Nate clicks the Education category. Three letters
    9·1 answer
  • In Rizzati Corp, vice presidents in departments such as engineering, manufacturing, IT, and human resources report directly to t
    15·1 answer
  • In a PowerPoint presentation, it is not possible to add notes that are hidden from the audience's view.
    9·1 answer
  • How do you make a 'does not equal' symbol on the computer? you know the equal sign with a line through it..?
    6·1 answer
  • Which of the following does Moore's law predict?
    15·1 answer
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • Do you like Anime and if so if your 13-15 let’s be friends my number is 954 643 2050
    13·1 answer
  • Select the functions in the Insert tab in PowerPoint.
    8·1 answer
  • What is control structure write it's types​ .
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!