1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
10

What do you call the ability to use the internet

Computers and Technology
1 answer:
Alchen [17]3 years ago
5 0

Answer:I call it life

Explanation:Without it I’m dead

You might be interested in
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
1 year ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
When did the first usb flash drive appear on the retail market? Which company developed this storage medium?
jeka57 [31]

The first commercially-available USB flash drive was the "ThumbDrive," produced by Singapore company Trek Technology in 2000. The drive had capacities of

8 MB

64 MB

1.44 MB

256 MB

7 0
3 years ago
What does the ‘SIM’ in the SIM card stand for?
hram777 [196]

Answer:

It stands for Subscriber Identity Module

Explanation:

<em>SIM cards are computer chips that store data and enable you to access your network. That implies you may call, text, and connect to mobile internet services such as 4G. SIM cards are  portable, and you can store messages, contacts, and emails to them. SIM cards connect a specific account to a specific phone; they inform the phone network firm which account is linked to which phone. Customers are typically referred to as subscribers by network operator providers. A SIM card is a type of user card that allows your phone to connect to a network. Also, if you had a phone accidents and you can s imply insert the SIM card in another phone and you may make a call or utilize your data. Just make sure they each utilize the same size SIM card.</em>

4 0
2 years ago
Read 2 more answers
How to combine multiple documents into one pdf.
sergeinik [125]

Answer:

How to combine and merge your files into one PDF: Open Acrobat DC to combine files: Open the Tools tab and select "Combine files." Add files: Click "Add Files" and select the files you want to include in your PDF. You can merge PDFs or a mix of PDF documents and other files.

Explanation:

8 0
2 years ago
Other questions:
  • Which tab is used to insert a hyperlink onto a slide
    8·2 answers
  • 6. How can you encrypt an entire drive, including files and folders belonging to other users? a. EFS b. User Account Control c.
    11·1 answer
  • What is a risk or an effect of software piracy?
    9·2 answers
  • Candice’s first job was at the grocery store making deli food. While in culinary school, she worked part time in a restaurant ki
    12·2 answers
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • A _____ is a type of legal protection for which person can apply to protect an invention or a discovery.
    9·1 answer
  • Discuss the economical challenges in software reuse using suitable examples.
    10·1 answer
  • What are your undertale + au ships?
    15·1 answer
  • Tier 1 networks form the internet ____.​
    15·1 answer
  • Select the correct answer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!