1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
5

Pros and cons of using the internet

Computers and Technology
2 answers:
MAVERICK [17]3 years ago
7 0
It is easy to find information, but it is not always right.
chubhunter [2.5K]3 years ago
5 0
You have to double research because anyone can post on the Internet and some answers are true and some are false
You might be interested in
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
Makovka662 [10]

Answer:

Encapsulation

Explanation:

There are seven layers in the OSI network model. These layers are, application, presentation, session, transport, network, data-link and physical layer.

Each layer of the OSI model has a PDU or protocol data unit. These PDUs are form by encapsulation.

The application, presentation and session data. When it moves to the transport layer, it is encapsulated within the transport header. This new pdu is called segment.

This process continues in network and data-link to give packet and frame PDUs respectively.

5 0
3 years ago
What is a subjective point of view
anastassius [24]

Answer:

one based on opinion rather than fact, upon which reasonable people could disagree.

Explanation:

An example of a subjective point of view is a position taken on whether a movie or book is good or bad

6 0
3 years ago
Read 2 more answers
What term defines Internet applications that help people connect with each other through a virtual environment by providing them
DaniilM [7]
As for this problem, the most probable and the most likely answer to this together with the presented options would be D. Social Networks.

Social networks is the term that defines Internet applications that help people connect with each other through a virtual environment by providing them with a collection of online tools. These tools include the instant messaging, the uploading of pictures and other tools that is found useful in connecting with people online. This has become phenomenon and the most popular social network as of the moment would be Facebook.
6 0
4 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
Other questions:
  • Write a program that defines a type for a structure that stores information on a student in ENG EK 125. Declare two variables to
    8·1 answer
  • ​________ establishes a connection between the​ computers, sequences the transfer of​ packets, and acknowledges the packets sent
    11·1 answer
  • How do say phone in French?
    10·2 answers
  • In this assignment you will write a function that will calculate parallel resistance for up to 10 parallel resistors. Call the f
    12·1 answer
  • You can italicize a word by selecting it and clicking the Italics icon. What keyboard shortcut could you use instead of clicking
    11·1 answer
  • The term BIOS stands for
    6·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • Before a new email application could be released to the public, it was released for a few days to some account holders of a webs
    14·2 answers
  • HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
    12·1 answer
  • What is destination email address​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!