1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
2 years ago
5

What query class will you choose for this query "women are evil"?

Computers and Technology
1 answer:
nikklg [1K]2 years ago
7 0

Answer:

A) Gibberish or Vague Profane

Explanation:

Hope this helps

You might be interested in
Marco had a database that showed the first, second, and third favorite ice cream flavors for each person in his school. He used
Maksim231197 [3]

Answer:

B

turned data into information

7 0
3 years ago
Read 2 more answers
When would it be beneficial to make a copy of a document
aksik [14]

Answer:

When you need to keep the original document or send the document to multiple people.

Explanation:

If you need to keep the original document (eg. marriage documents or birth certificate or something important), you would make a copy of it (unless you are sending it to a lawyer or a government agency).

If you, for instance, have a memo for your company that all your employees need to read, you would copy the document so you would be able to print it and send it to everyone without passing the document one at a time.

3 0
3 years ago
Email, instant messaging and most web traffic go across the internet in the clear; that is, anyone who can capture that informat
solniwko [45]
Yes.  Originally ARPAnet (Advanced Research Projects Agency) was conceived as a network between large universities, the government, the military and government contractors. Basically a bunch of friends and aquaintences.  Security really wasn't a consideration until after ARPAnet was opened to the public.
8 0
4 years ago
Read 2 more answers
Question 1 (1 point)
lisov135 [29]

Answer:

  1. costumes
  2. systematic thinking
  3. sensing
  4. motion
  5. cap block
  6. stack block
  7. computational thinking
  8. programming
  9. computational thinking

Brainlist Pls!

8 0
3 years ago
The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless acce
drek231 [11]

SSIDs and Physical security

It is always recommended to have separate networks. And in this case, the SSID (Network Name) of the guest network should be separate from the main network. It is best to enable a guest account on your router and assign a new SSID. You can leave this network open or password-protect it. Visitors will be locked out from accessing the main network’s devices like printers and other sensitive information.

Physical security.

In terms of a secure network, nothing is safer than having your guest network installed on a separate hardware. By having a few access points set up for the guest network, your guests could entirely be segregated from the main business network.


4 0
3 years ago
Read 2 more answers
Other questions:
  • All of the following are types of data storage devices except CD/DVD computer monitor digital cameras flash drive
    15·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • Design an application that has an array of at least 20 integers. It should call a module that uses the sequential search algorit
    13·1 answer
  • What components are in hard drives?
    12·1 answer
  • ____ is a programming language used to view and manipulate data that is stored in a database.
    6·1 answer
  • Which Step did Mario forget ​
    11·1 answer
  • The following code processes a file containing five positive numbers. What will the variable $result contain after the code is e
    13·1 answer
  • Is it true or false 1-5
    13·1 answer
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
  • Answer if you know Javascript, html, css, python, and Ruby.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!