1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
15

Controlling access of information on the internet

Computers and Technology
1 answer:
Genrish500 [490]3 years ago
4 0

Answer:

If you control access on the information on the internet than your going to have to make sure you search what you need and not advertisements or any wrong sites.

Explanation:

You might be interested in
What is the purpose of a mail merge field?
goblinko [34]

Answer:

Mail Merge is a way to send the same message to a large number of persons, with each one properly addressed to a specific person.

Explanation:

8 0
4 years ago
Read 2 more answers
How are switches indirectly involved in ARP poisoning?
11Alexandr11 [23.1K]

Answer:

They

are indirectly involved in the attack because they do not verify the the MAC/IP address

association

Explanation:

PLEASE MARK ME AS BRAINLIEST

8 0
3 years ago
What are all the possible 4-digit codes you can make with the numbers 7, 0, 9, and 3?
Arte-miy333 [17]
0,7,0,0
9,9,0,0
7,7,7,7
3,9,0,7

Hope this helps
4 0
3 years ago
Read 2 more answers
Most printers are plug and play compatible and must be manually configured when they are plugged into the system.
nikdorinn [45]

Answer:

False

Explanation:

Plug and play devices are computer peripheral devices that can be used immediately, with little or no necessary configuration when plugged or connected to the computer system.

Printers are mostly electronic devices used as an output of a hard copy of a computer system application document. They are not part of the computer system (peripheral devices). They come with installation disk which a computer must install, in order to be able to use the printer.

Yes they are peripheral devices, but they are not plug and play devices since its software must be installed on the computer, to use it

8 0
4 years ago
Read 2 more answers
DSSS uses a chipping code to encode redundant data into the modulated signal. Which two of the following are examples of chippin
Schach [20]

Answer:

Option A and Option D

Explanation:

5 0
4 years ago
Other questions:
  • When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihoo
    5·1 answer
  • Where should you click to edit an existing formula?
    12·2 answers
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
  • What is the role of computer in education sector?​
    13·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
  • which two functions are performed at the llc sublayer of the osi data link layer to facilitate ethernet communication? (choose t
    13·1 answer
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
  • Explain why computer professionals are engaged in technical services
    14·1 answer
  • Choosing a per_formatted presentation that already has a design and the slots is called choosing What​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!