1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gogolik [260]
2 years ago
15

What is web browser ?​

Computers and Technology
1 answer:
vagabundo [1.1K]2 years ago
5 0

Answer:

A web browser, or simply "browser," is an application used to access and view websites.

You might be interested in
What is the technological singularity and what are the dangers it brings to man
professor190 [17]
The definition according to google and the dictionary of technological singularity is the following : The technological singularity (also, simply, the singularity) is the hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization.

The dangers this brings to man kind is the fact that people will turn out to not be people or there may be a different species considered as humans or human kind .Also we were made as humans from something else artificial super intelligence will basically be forming from us which means it will be forming from something that was already mean basically meaning there will be something changed within the species or artificial super intelligence itself.
3 0
3 years ago
What types of storage can be used to access your data on another computer?
Ivenika [448]
<span>You could use cloud storage. Basically, the things you save are actually saved on another computer, that is, on another server, that is used as a hard drive for many pcs. You can access the cloud storage if you have internet and it works like a normal hard drive. There are even laptops that don't have storage other than cloud storage.</span>
6 0
3 years ago
Jargon is:
pentagon [3]

Answer: The answer would be "B" - language that includes terms that only a select few can understand

Explanation:

3 0
3 years ago
Read 2 more answers
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue,
Dvinal [7]

This issue will happen mostly if cellular network will not be down, or suppose if cellular network is down mostly, or it will be rainy or a current cutoff issue might be occurred.

<u>Explanation:</u>

The following step to be made for trouble shoot his phone when cellular network is down.

1. Restart the mobile:- After restarting kindly check mobile connectivity.

2. Check for mobile air plane mobile and make sure the mobile phone is not in air plane mode.

3. Check the income and outgoing vapidity.

4. Switch off the mobile, Remove service provider sim card from mobile and reinsert the sim card and start the mobile.

5. Still connectivity problem, either contact the service provider or replace with new sim card.

5 0
3 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Write an algorithm whether the given number is positive negative or zero​
    5·1 answer
  • What is the correct order of network types when categorized by their size or the physical area they cover, from largest to small
    10·1 answer
  • Serveral cheetas are growling at each other while hunting for animals.for which need are they competing?
    14·1 answer
  • In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
    12·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • Evaluate if the following function is a good candidate to be placed in a library. Why or why not?
    10·2 answers
  • Write a program that produces an expense report for a trip to Lagos, Nigeria. Use the Internet to research the cost to travel to
    13·1 answer
  • Which of the following is the best way to keep up with trends in your industry?
    8·1 answer
  • Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!