1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
3 years ago
9

Web analytical packages can obtain the following information when someone visits a website, except Group of answer choices name

and address of web visitors geographic location Internet connection type navigation source
Computers and Technology
1 answer:
il63 [147K]3 years ago
3 0

Answer:

name and address of web visitors.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

Web analytical packages are software features that are typically used for tracking the identity of a computer system by placing or adding cookies to the computer when it's used to visit a particular website. Thus, it's only used for tracking the identity of a computer but not the computer users.

This ultimately implies that, web analytical packages can obtain the geographic location, Internet connection type, and navigation source information when someone visits a website, but it cannot obtain the name and address of web visitors or users.

You might be interested in
Which of the following tasks are suitable for creating an algorithm? Choose all that apply
Hatshy [7]

A tasks are suitable for creating an algorithm are:

  • giving directions to a location.
  • solving a math problem.
  • tracking money in a bank account.
  • tracking the number of items in inventory.

<h3>What is algorithm?</h3>

An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.

Note that in the case above, A tasks are suitable for creating an algorithm are:

  • giving directions to a location.
  • solving a math problem.
  • tracking money in a bank account.
  • tracking the number of items in inventory.

See options below

giving directions to a location

saving time writing a computer program

solving a math problem

tracking money in a bank account

tracking the number of items in inventory

Learn more about algorithm from

brainly.com/question/24953880

#SPJ1

8 0
2 years ago
Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the c
Phantasy [73]
<h3>What is Network forensics ?</h3>

Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.

The probability distribution is 1.25.

Read more about the probability distribution:

brainly.com/question/24756209

#SPJ1

5 0
2 years ago
What is the first thing animators need to determine when beginning a project?
tatuchka [14]

Answer:c

Explanation:

8 0
3 years ago
Write common ICT tools​
Naddika [18.5K]
  • computers
  • laptops
  • printers
  • scanners
  • software programs
  • data projectors
  • and interactive teaching box.

4 0
2 years ago
Where can elicitation techniques be used?
Nikitich [7]

Answer:

An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.

Explanation:

3 0
3 years ago
Other questions:
  • Peripherals can be used to input information. True False
    6·2 answers
  • Nonvolatile in the context of data storage means ________________. a. the data can't be changed in a data warehouse. b. the data
    11·1 answer
  • which virtue you need to secure information by limiting computer access to authorized personnel only?
    10·1 answer
  • 1- How should an operating system support communication between applications? explain your reasoning?
    10·1 answer
  • To prepare a data character for transmission, a ____ bit is added to the beginning of the character and informs the receiver tha
    11·1 answer
  • Design a function that checks if a keyword exists in a given keyword tree and returns true if so and returns false otherwise. Af
    13·2 answers
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • Please explain this code line by line and how the values of each variable changes as you go down the code.
    8·1 answer
  • Phoebe is a Counselor who is trying to schedule a meeting with one of her patients. Which best describes an inappropriate locati
    10·2 answers
  • given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_val
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!