1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
11

Do you think communities or countries can survive without the internet?why or why not?​

Computers and Technology
1 answer:
abruzzese [7]3 years ago
7 0

Answer:

here

Explanation:

Generally, very few will survive without internet and some technology geek will die overnight due to lack of things to research. Most of the brand and business will lose their online presence in no internet mode

You might be interested in
the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​
Elis [28]

The computers that communicate with each other are called \sf\purple{transmission \:control\: protocol\: (TCP)}.

\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}

8 0
3 years ago
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
What provides access to the internet?
Sphinxa [80]
A router!
12345678901234567890
6 0
3 years ago
When powering up the computer, the initial program loading and start-up is performed by using a ______________ program that is b
vitfil [10]

Answer:

The answer is Bootsrap

Explanation:

A bootstrap program which is also referred to as a bootstrap loader is a program that resides in the computer’s Read Only Memory. It starts the whole chain reaction and ends up with the entire OS being loaded. This program reads the computer’s hard drive boot sector and continues with the process of loading the Operating System. It first performs a POST test and then proceeds to load the OS intothe main memory.

4 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
Other questions:
  • In Java :
    11·1 answer
  • Under extreme programming, ________ and ________ are intimately related parts of the same process
    13·2 answers
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • Which is a false statement considering copyright law?
    13·2 answers
  • A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the developm
    11·1 answer
  • When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th
    9·2 answers
  • Write an app that reads an integer, then determines and displays whether the integer is odd or even. [Hint: Use the remainder op
    10·1 answer
  • As u type where does excel display the entry
    10·1 answer
  • How is cell phone usage changing American Society? Is this a good change or a bad change? Explain.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!