Similar complexities arise with something as apparently simple as viewing
a webpage. If we do not have permission to view the page, or the page
we are looking for is not available, then in a general sense we have not
‘accessed’ that page. We have, nonetheless, sent a communication to various
computers along the way, each of which has performed a function in
response to our request.61