1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
15

Controlling access of information on the internet

Computers and Technology
1 answer:
Genrish500 [490]3 years ago
4 0

Answer:

If you control access on the information on the internet than your going to have to make sure you search what you need and not advertisements or any wrong sites.

Explanation:

You might be interested in
Which file format results in the smallest file size
Agata [3.3K]
Kilobytes. That the smallest type of file you have on a computer.
6 0
4 years ago
What is hyperlink and its used in website
snow_tiger [21]

Explanation:

Hyperlink is the primary method used to navigate between webpages.

Hyperlink can redirect us to another webpages, such as websites that has graphics, files, sounds on the same webpage.

6 0
3 years ago
How do you award a brainliest
erik [133]

Answer: Usually there has to be 2 answers. When you go to the answers on your question there should be a outlined crown or something like that, then you click that.

8 0
3 years ago
Read 2 more answers
Andrew frequently uses bullet points and numbered lists in his presentation to _____.
seraphim [82]

Hey there!


Andrew likely does this to convey a <em>point </em>easily. Bullet points offer a way to explain a topic, but in simple sentences that when all add up, explain it. They're meant to be short and sweet, and don't make the reader lose their attention.


Hope this helps!

5 0
4 years ago
Read 2 more answers
For each of the following algorithms, indicate their worst-case running time complexity using the Big-Oh notation, and give a br
DerKrebs [107]

Answer:

See explaination

Explanation:

An algorithm can be looked as a procedure or formula for solving a problem, based on conducting a sequence of specified actions.

In most cases we can say a computer program is an elaborate algorithm.

Please kindly check attachment for the step by step solution of the given problem.

8 0
3 years ago
Other questions:
  • Supermarket managers who use scanners on the checkout counters to track inventory levels of their products are using a(n) ______
    11·1 answer
  • The dfs replication engine uses a form of replication called
    6·1 answer
  • In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes
    15·1 answer
  • What is the Java source filename extension? What is the Java bytecode filename extension?
    14·1 answer
  • A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located
    14·2 answers
  • Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
    5·1 answer
  • Processor speeds are in bytes.<br><br> True<br> or<br> False
    12·2 answers
  • Taylor is getting ready to send an e-mail. In three to five sentences, give Taylor some advice for sending an effective email.
    13·1 answer
  • This assignment is based on Exercise 8.4 from your textbook. Each of the following Python functions is supposed to check whether
    11·1 answer
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!