1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
3 years ago
8

Sending obscene material over the internet cannot be successfully prosecuted because of what

Computers and Technology
1 answer:
babunello [35]3 years ago
5 0
Hey there! Hello!

For this question, I'm not sure if you have multiple choice answers; if you do and my answer doesn't really fit into any of them, let me know and we'll take it from there.

Putting anything on the internet can pretty much guarantee that it will stay on the internet forever. Someone, whether it be someone who saved/screenshot your post or the service that controls the posts of the website saving a copy of it and all other posts, it's impossible to get rid of all remnants of a post once you have posted it. Think of all the people who may have reblogged/retweeted/re-whatevered a post on a service that supports it, too.

Most social networks put in their Terms and Conditions that they are allowed to see any and all of what anyone posts or sends to someone through their service. If you DM your significant other a picture of you that you wouldn't want your mom to see, the social service then has the right to view and save information related to the post for quality/functionality/ whatever other reasons. Social services usually have the right to save copies of any information you give to them, whether it be your name/email address or a credit card, for advertising/other purposes.

Also keep in mind that caches exist. The entire purpose of Google Cache is to dig up HTML's from old websites that don't exist anymore for the purposes of allowing someone to view their beauty once more.

Point is, you can burn papers and the information that they held, as long as it wasn't copies and distributed, will be gone. But it's not exactly possible to burn deep-rooted information in the internet's servers that may not be accessible to you once you have deleted your copy of it, but very much accessible to anyone with the expertise to dig it out.

Hope this helped you out! Feel free to ask any additional questions if you have any. :-)
You might be interested in
Which of the following are examples of typical problems an ISS professional would encounter? Check all
natali 33 [55]
I’m guessing B! Seems to be the best
8 0
3 years ago
Read 2 more answers
Write a loop to print 56 to 70 inclusive (this means it should include both the 56 and 70). The output should all be written out
IRINA_888 [86]

Answer:

for i in range(56,71):

   print(i)

Explanation:

By the range 56 to 71 it means that for loop will run when i=56 to i=71, but the upper bound is one less than the upper bound, and which is 70. So the above loop will print integers from 56 to 70.

And the above code is in Python.

4 0
3 years ago
The implementation stage of the SDLC _____.
Karolina [17]

Answer:

d. involves analyzing end-user business requirements in order to refine project goals

Explanation:

In the software development life cycle, the implementation stage is the stage where the computer programmers begin the actual coding of the application required by the end-user. At this stage, the developer takes into account the needs and specifications of the customer.

For example, if the end-user wants a software application that can track payment records, the researcher at this stage begins using the right software to code programs that can effect this function.

6 0
3 years ago
A construction-based client would like to develop an application that can analyze an image of machinery and overlay information
Elden [556K]

A form of Extended Reality which can best assist the client with information on the repair is: 3. Augmented Reality.

<h3>What is Extended Reality?</h3>

Extended reality refers to an umbrella terminology that is used to describe all real and virtual physical environments (realities) and human-machine interactions through the use of computer technologies and wearables.

<h3>The forms of Extended Reality.</h3>

In Computer technology, there are four (4) main types of Extended Reality and these include:

  • Mixed Reality
  • Haptic Reality
  • Virtual Reality
  • Augmented Reality

Augmented Reality is mainly applied in maintenance and repair by analyzing an image of machineries and provide information that will assist in the repair process.

Read more on Augmented Reality here: brainly.com/question/9054673

4 0
3 years ago
What are some ways to access the Excel Help window? Check all that apply. clicking and dragging the zoom slider on the status ba
Fudgin [204]

double-clicking the title bar

clicking the question mark in the upper-right corner of the interface

8 0
4 years ago
Read 2 more answers
Other questions:
  • A bunch of computer scientists take over an island and start their own country. They want the license plates to use binary numbe
    11·1 answer
  • Choose the two main capabilities involved in visual literacy
    13·1 answer
  • Dani needs to present a mathematical formula to his audience. How should he start the process of adding an equation to a slide?
    5·1 answer
  • When you need to cut new external threads on a bolt, what tool should you use?
    7·2 answers
  • Write a program that reads from user (i) an hour between 1 to 12 and (ii) number of hours ahead. The program should print the ti
    15·1 answer
  • Ada lovelace designed the first computer
    7·1 answer
  • How does a hard drive work?
    5·1 answer
  • Super computer in nuclear energy ​
    13·1 answer
  • Write a program that multiplies two hard-coded numbers, then prints the individual numbers out and prints their product out, all
    10·1 answer
  • _________values are stored as the number of seconds since the unix epoch (35 POINTS)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!