1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
4 years ago
8

How do you access the dark web

Computers and Technology
2 answers:
Artist 52 [7]4 years ago
8 0

Answer:

look up dark web links

Explanation:

Pavel [41]4 years ago
8 0

Answer:

Use Tor Browser, Make sure you have a untraceable router

download Grams And it takes to the Ground deep in the dark web

i tried and yes it works but must have good PC a lot of hackers

but there's a lot of other ways but I use this it works for me

You might be interested in
You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
mestny [16]

Answer:

Option B i.e., Update the UEFI firmware.

Explanation:

The user had many periods of using the same machine. He wants to update the processor to increase the existing service period. Later, he tests the paperwork onto the motherboard and buys the best motherboard-supported processor.  

While the user starts the machine, though, that makes a noise constantly, nothing is shown on its monitor and it wouldn't start. So, the first step is he will update firmware from UEFI.

Thus, the other options are not correct according to the scenario.

6 0
4 years ago
Mention the usage of crop concept in ms-word​
nignag [31]

Answer:

Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Ms.word allow you to hide portions of picture that you do not want to be displayed in the final result.

3 0
3 years ago
Read 2 more answers
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
What is the base of a number system?
Vinvika [58]

A number base is the number of digits or combination of digits that a system of counting uses to represent number. The most commonly used number system is the decimal system, commonly known as base10.

6 0
3 years ago
You are the network administrator for your company. You want to look at some of the resources on the network. Specifically, you
mr Goodwill [35]

Answer:

" Performance Monitor" is the correct solution.

Explanation:

  • The most comprehensive method or indication for viewing but mostly analysis of those same applications as well as hardware-related issues would be determined as "Performance monitor."
  • Performance Monitoring seems to be a combination of methods as well as technologies to assess relatively quickly apps work throughout the data center.

3 0
4 years ago
Other questions:
  • Which computer device helps you input data in the form of text, numbers, and commands?
    9·1 answer
  • How much does a tech person get each year?
    11·2 answers
  • Create a SavingsAccount class. Use a static data member annualInterestRate to store the annual interest rate for each of the sav
    10·1 answer
  • What lever has resistance between the axis (fulcrum) and the force (effort)?
    10·2 answers
  • Vertebrates first arrived during the _________________.
    9·1 answer
  • Write a program that will manipulate Rectangle objects for which you will create a Rectangle class.
    5·1 answer
  • The domain is the part of an Internet address that refers to a group of computers on a network
    13·1 answer
  • Write a line of code to convert time to hours. Remember there are 60 minutes in an hour. Then write a line of code to calculate
    9·2 answers
  • When was "Rick Astley Never Gonna Give You Up" originally made?
    6·2 answers
  • CISC vs RISC processors might be used, and come up with environments where one processor would outperform the other.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!