The user can access and manipulate the internet, such as access to the internet, its protocols, its structure, the world wide web, communication, data transfer, even the electricity/light running through the wires and wireless technology. They can hack, view and alter all information stored on the internet. The user can also enforce and hack security with ease.
| Graph IRI | Count |
|---|---|
| http://dbkwik.webdatacommons.org | 21 |