1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
15

Controlling access of information on the internet

Computers and Technology
1 answer:
Genrish500 [490]3 years ago
4 0

Answer:

If you control access on the information on the internet than your going to have to make sure you search what you need and not advertisements or any wrong sites.

Explanation:

You might be interested in
How many bits are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 12 bits o
AURORKA [14]

Just multiply all numbers to get the total number of bits:

25*50*12 = 15000 bits.

3 0
3 years ago
Hubs connect network hosts in which configuration?
nataly862011 [7]

Answer:

A high availability hub is not required to enable or use the self-describing agent. You can optionally configure a high availability hub for improved availability and recovery if the hub fails. Network Layer – The network layer is responsible for creating a routing table, and based on the routing table, forwarding the input request. Some of the Devices used in the Network Layer are, Routers: A router is a switch-like device that routes/forwards data packets based on their IP addresses.

Explanation:

(hope this helps can i plz have brainlist :D hehe)

8 0
2 years ago
If you hold down the alt key and click anywhere in your document what happens
sukhopar [10]
<span>The Alt key on a PC is utilised to change the capacity of other squeezed keys. It will go to any desired short cut in the computer that is being accessed. in short , one can use this to reach other functionality of a windows based computer easily. For example, if you were accessing documents and you want to skip to a different function from what you were doing on the desktop.</span>
4 0
3 years ago
In the context of in-house software development options, companies that develop software for sale are called _____.
Pavel [41]

A software vendor is an organization specializing in making and selling software for mass or niche markets. 

A software dealer is an organization which sell software produced by others.

Meanwhile, Software distribution<span> is the process of delivering </span>software<span> to the end user. And the person or organization who are responsible for distributing software to others are called as software distributors.</span>

Here the answer is A.

6 0
3 years ago
True or Flase<br><br> In C++, the body of a for loop may never run even once.
stiks02 [169]

Answer: True

Explanation: For loop is used in the C++ programming is defined as the statement that defines about the flow control .This loop works under some condition that is considered.

For loop is evaluated to execute for one time if the statement condition is true but there are also chances of no execution at all because of the incorrect condition. So, for loop might not run even once in that condition.Thus , the statement given is true.

3 0
3 years ago
Other questions:
  • Weber believed that there is an inevitable destructive quality to which one of the four types of action?
    8·1 answer
  • In Microsoft Windows, which of the following typically happens by default when a file is "double-clicked"
    10·2 answers
  • A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundanc
    7·1 answer
  • If you see ##### in a cell, you should
    10·1 answer
  • When a speaker is finished talking, you should allow for _____.
    14·2 answers
  • (EASY 15 POINTS) What are two indications in a browser that a secure connection is being used?
    6·1 answer
  • What factors do network consultants consider when determining the network needs of a business? Use the space provided below to a
    6·1 answer
  • What is the school wifi password trying to do my class work in school on different devices.
    9·1 answer
  • Identify the calculation performed by the following code.
    7·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!