1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gre4nikov [31]
3 years ago
11

Please select the word from the list that best fits the definition

Computers and Technology
2 answers:
GalinKa [24]3 years ago
6 0

Answer:

B. Unsafe Sites

Explanation:

Unsafe Sites are not safe and contain content which may be offensive and which could also be harmful for younger children.

Lesechka [4]3 years ago
6 0

Answer:

B. Unsafe Sites

Explanation:

You might be interested in
identify three ways we use analog and digital signals in our everyday lives. Describe how radio telescopes are used to explore s
spayn [35]
We use analog and digital signals in our everyday lives with the radio, the cell phone and with our own computers. our computers and our cell phones are all digital now but radio's are still considered analog. Radio telescopes explore space by using radio waves and signals to almost like scan space and collect data like a sonar in a submarine. 
8 0
3 years ago
Read 2 more answers
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Explain program and programming with two examples of each<br>Help​
evablogger [386]

Answer:

program (noun) is executable software that runs on a computer. ... Examples of programs include Web browsers, word processors, e-mail clients, video games, and system utilities. These programs are often called applications, which can be used synonymously with "software programs." On Windows, programs typically have an .

7 0
3 years ago
According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can gre
Zanzabum

Answer:

90%

Explanation:

3 0
3 years ago
What is the purpose of a mail merge field?
Alex73 [517]

Answer:

to set up placeholders in a document where data will be inserted

4 0
3 years ago
Read 2 more answers
Other questions:
  • Below is a chart representing portions of resumes from 3 applicants. Which best explains the applicants careers?
    11·1 answer
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • The ____ command is used to disconnect a datatable object from the database. (
    15·2 answers
  • Select the correct answer.
    6·1 answer
  • What do application in productivity suites have in common
    5·1 answer
  • If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
    6·1 answer
  • Which term best describes these lines?
    7·1 answer
  • An object completes one round of circle of radius 7m in 20 sec. Distance travelled after 10 sec is? ​
    12·1 answer
  • Dynamics
    11·1 answer
  • Posts that you delete
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!