1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
13

Compare the four ways of regulating the internet​

Computers and Technology
1 answer:
Bas_tet [7]3 years ago
7 0

Answer:

the four is all the same way that can harm people through the internet

Explanation:

You might be interested in
Match the features of a word processing software to their corresponding functions.
padilas [110]

Answer:

Options - changes the behavior of the grammar checker

Replace - enables you to add or remove misspelled words

Change All - changes all occurrences of the misspelled words

Explain - provides the description of grammar errors

Explanation:

Let me know if this helps! :)

7 0
3 years ago
Someone claims that the big O notation does not make sense at all, and they give the following example. An algorithm A that proc
Svetllana [295]

Answer:

Big Oh notation is used to asymptotically bound the growth of running time above and below the constant factor.

Big Oh notation is used to describe time complexity, execution time of an algorithm.

Big Oh describes the worst case to describe time complexity.

For the equation; T(N) = 10000*N + 0.00001*N^3.

To calculate first of all discard all th constants.

And therefore; worst case is the O(N^3).

7 0
3 years ago
4. Each mobile device described in this chapter requires that the user have a/an ____________________ associated with services o
RSB [31]

All mobile devices requires that end users have an <u>account</u> that is associated with services offered by the publisher of the mobile operating system (OS) installed on the device.

A mobile device can be defined as a small, portable, programmable electronic device that is designed and developed for the transmission and receipt of data signals (messages) over a network. Thus, a mobile device must be designed as a handheld device with communication capabilities.

Additionally, mobile devices such as smartphones have a mobile operating system (OS) installed on them, so as to enable them perform various tasks such as:

  • Taking pictures and creating video files.
  • Typing and sending both text and multimedia messages.
  • Browsing the Internet.
  • Making both audio and video calls.

As a general rule, all mobile devices requires that end users have a registered <u>account</u> associated with the services offered by a publisher of the mobile operating system (OS) installed on the device. This registered account serves as a unique identifier and it connects an end user with the publisher of the mobile operating system (OS).

Read more: brainly.com/question/4922532

6 0
3 years ago
A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
elena-s [515]

Answer:

Client To Site.

Explanation:

The Client-to-Site is a virtual private network which used to provide the connection of the device like a laptop to the organization network. In the Client To Site a single computer is connected to the remotely network, for all the purpose and the intent of the network.

The single laptop is connected with a remote machine in the firewall. The  "IPSec" protocol is used in the Client To Site connection.

3 0
4 years ago
Debate whether social networking is harmful or helpful to society.
Dmitriy789 [7]

Answer:

I believe that Social Networking <em>IS </em>helpful to society, but, people use it for wrong stuff.

5 0
2 years ago
Other questions:
  • What e-reader technology males a screen that is easy to read and extends battery life
    6·1 answer
  • 11What is the definition of bandwidth? the speed at which bits travel on the network the measure of the transfer of bits across
    7·1 answer
  • A is the smallest unit of application data recognized bysystem software.
    12·1 answer
  • _________ attacks are becoming less common in modern operating systems.
    11·1 answer
  • Under what circumstances would a user bebetter off using a time-sharing system rather than a PC or asingle-user workstation?
    13·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • Which function in Excel tells how many
    6·1 answer
  • Discuss how the Internet has made our communication hypertextual, omnidirectional, and more interactive
    6·1 answer
  • Write a query that returns the first name of a student whose last name is "Patil" and is in the Ravenclaw house.
    9·1 answer
  • 3. Answer the following questions.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!