1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
12

The internet is owned and run by the us government. a) true b) false

Computers and Technology
2 answers:
krok68 [10]3 years ago
5 0
False, the government CAN control the internet, but thankfully it is not owned by them. Anybody with access to the internet can run it.

AleksAgata [21]3 years ago
3 0
It is false. It is not run by them, but it is controled. They have access to anything on the internet, ever, but they don't nessicarily own or run it.
You might be interested in
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
What is a detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy
Sonbull [250]

Answer:

"Compliance audit " seems to be the correct answer.

Explanation:

  • A compliance or enforcement audit seems to be a systematic analysis of the conformity of such an agency to the reporting requirements and guidelines.
  • In a compliance audit, independent auditors determine the extent and completeness of enforcement plans, security protocols, user authentication, including risk management framework.
8 0
3 years ago
What is computer generation​
MA_775_DIABLO [31]

Answer:

Generation in computer terminology is a change in technology a computer is/was being used which includes hardware and software to make of an entire computer system .

8 0
2 years ago
Tricking someone else into sharing private information, then posting it publicly online, is a form of which type of cyberbullyin
Alisiya [41]
If the bully did not first befriend the person, it’s outing. If he did, then it’s trickery.
5 0
3 years ago
The Scratch blocks are organized into 9 color-coded categories. Select all that apply.
Ira Lisetskai [31]
Motion,control,operators,events,sound,loop,looks, more blocks, and I think sensing!
7 0
3 years ago
Other questions:
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    14·2 answers
  • 40 POINTS PLZ HELP NEED ASAP!!!
    5·1 answer
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • "Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
    6·1 answer
  • Key physical database design decisions typically do not include: A) choosing the storage format for each attribute from the logi
    12·1 answer
  • Sometimes when a baby is born they need to be kept in an incubator for a period of time. A manufacturer would like to design a n
    11·1 answer
  • Karel challenges answers
    11·1 answer
  • To use appropriate personal protective equipment we should​
    12·1 answer
  • What should you consider when developing your website content?​
    6·2 answers
  • Create a dynamic array of 100 integer values named myNums. Use a pointer variable (like ptr) which points to this array. Use thi
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!