1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
2 years ago
12

Should people who download music and movies illegally be punished?

Computers and Technology
1 answer:
Mrrafil [7]2 years ago
3 0
Opinion wise, I disagree with punishment. 
You might be interested in
What is done when Python complies your program
alexgriva [62]

Answer:

It makes

Explanation:

it run the program

4 0
3 years ago
Read 2 more answers
What is the name of a computer or application program that intercepts user requests from the internal secure network and then pr
defon
A proxy server is a server that intercepts user requests from the internal secure network and then processes that request on behalf of the user.
The proxy server can be a computer or application program<span> that gets the requests from clients and seeks resources from other </span>servers. It is a <span>intermediary point between the end user and the backbone network.</span>
8 0
3 years ago
11. Which one of the following buttons is used for paragraph alignment?<br>​
Luba_88 [7]

Answer:

<em>C</em>

Explanation:

Option <em>A </em>is used for line spacing.

Option <em>B </em>is used for right indent.

Option <em>C</em> is used for right paragraph alignment.

Option <em>D</em> is used for bullet points.

The button used for paragraph alignment would be option <em>C</em>.

3 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authenticat
Mazyrski [523]

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

6 0
3 years ago
Other questions:
  • What does limited access to a document mean?
    14·2 answers
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • Which if the following ribbons in Microsoft word is used to add tables and images
    14·1 answer
  • SQL statement to verify the updated name field for the publisher with ID 5 SELECT * FROM Publisher WHERE PubID=5;
    7·1 answer
  • Who created apple and in what year was it created
    9·2 answers
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • What is the CSS property used to style text as all lowercase or uppercase?
    14·2 answers
  • How does leadership play a role in IT management? How does leadership need to be aligned to the company’s goals for IT managemen
    9·1 answer
  • Moving your Sprite from right to left is considered the X coordinate?
    5·1 answer
  • What is the output for the following program?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!