InPrivate browsing protects you from __________. (Choose all that apply.)

others from seeing the URLs that you accessed
seeing what you looked at on the Web
seeing what files you edited
using the Safety tab


others from seeing the URLs that you accessed

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a method used by passive sensors to monitor traffic?

A. spanning port B. network tap C. packet filter D. load balancer

Computer Science & Information Technology

The “prepackaged” functions that belong to JavaScript objects such as Math.pow and Math.round are often called ________.

a) subroutines b) routines c) methods d) functions

Computer Science & Information Technology

To ensure file system integrity, you use the ____ utility, which performs a sequential investigation of the file system.

A. mount B. fsck C. fdisk D. mkfs

Computer Science & Information Technology

Which of the following statements would store input in name?

A. name =    JOptionPane.showInputDialog("Enter your name and press OK"); B. name =   JOptionPane.showMessageDialog("Enter your name and press OK",                           JOptionPane.PLAIN_MESSAGE, null); C. name = System.in(); D. name = JOptionPane.input("Enter your name and press OK");

Computer Science & Information Technology