1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
11

If the user loads this graphic in a text only browser how will the browser describe it?

Computers and Technology
2 answers:
charle [14.2K]3 years ago
8 0

Im going to say probably not, it wont be able to describe it but it'll search it up and show what others match the image

steposvetlana [31]3 years ago
3 0

The answer is Absolute.

My quiz hasn't been graded yet but i'm sure it's correct. If not, sorry.

You might be interested in
What is the preferences of occupation in ones life?
umka21 [38]

Answer:

mark me brai list i request u

6 0
2 years ago
Many of today’s digital devices operate on battery power supplied by what kind of ion batteries.
stich3 [128]
"Lithium ion" is used in your cellphone.
6 0
3 years ago
What wired channel, commonly used for cable tv, consists of an insulated copper wire wrapped in a solid or braided shield placed
Airida [17]
the answer is A coaxial cable
8 0
3 years ago
Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice. Discuss what the Cybersecur
tiny-mole [99]

A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.

<h3>What are Cybersecurity objectives?</h3>

Cybersecurity aims are:

  • To protect computer system,
  • To protect networks,
  • To protect software programs from such cyber attacks.

Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.

Learn more about IT from

brainly.com/question/1276995

#SPJ1

3 0
1 year ago
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that
castortr0y [4]

Answer:

Moderate.

Explanation:

A breach of security can be defined as any incident which results in an unauthorized access or privileges to a network, computer, software application, classified informations or data and services. There are three (3) levels of impact on an individual or organization when there's a breach of security; low, moderate and high.

A moderate level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. It causes a serious adverse effect on individuals, employees or organizational assets and operations.

<em>However, in order to prevent a breach of security, it is advisable to use the following programs: firewall, demilitarized zone (DMZ), Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) etc. </em>

8 0
3 years ago
Other questions:
  • Using an array, double each of the following values and print each result: values = [1.1, 10, 4.55, 30004, 0.2]
    7·1 answer
  • Explain the steps users can take to maintain an operating system
    15·1 answer
  • The first computer (the eniac was how big
    8·1 answer
  • As an administrator for the Contoso Corporation, your primary office is in Sacramento and your data recovery site in Las Vegas.
    15·1 answer
  • Which of the following statements is true of a time management plan? It is work in progress that need to be altered many times?
    10·1 answer
  • Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write yo
    8·1 answer
  • Joe, a user, has purchased a new mobile device that uses a different OS than his previous one. Joe wants to copy his contacts an
    10·1 answer
  • Write a program that assigns values to
    15·1 answer
  • If anyone knows how to code on python:
    8·1 answer
  • Give a brief explanation about the internet.plsssss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!