1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
2 years ago
11

How has the internet improved business communication worldwide

Computers and Technology
1 answer:
emmasim [6.3K]2 years ago
4 0

Answer:

One of the biggest changes for businesses is the communication technology enabled by the internet. The way people communicate with one another, share files, make purchases, and collaborate has completely shifted since the internet became widespread.

Explanation:

You might be interested in
Al and Bill are arguing about the performance of their sorting algorithms. Al claims that his O(N log N)-time algorithm is alway
lisabon 2012 [21]

Answer:

See in Explanation

Explanation:

All you know is that an O(n log n) algorithm is eventually (a lot) faster than an O(n^{2} ) algorithm, but for any specific value of n, you can't say anything. Indeed, the asymptotic growth of the function doesn't depend on its value on n. This means that if  f(n)=O(n^{2} ) then for all c_{1} ,....\ , c_{99}, the following function is also O(n^{2} ):

f^{'} (n)=[\ cnf(n)\  if \ n

So asymptotic notation is completely uninformative regarding the performance of algorithms on specific values of n.

You could say that functions such as f^{'}(n) are artificial and never really occur in practice. This is not quite true (you can hard-code some auxiliary information for small n, for example), but even if you consider "natural" functions, asymptotic notation doesn't help you to determine anything other than asymptotic's: consider for example n^{2} against 10^{100}n\  log \ n (such examples definitely happen in practice, for example in fast matrix multiplication).

7 0
3 years ago
What are some limitations when it comes to testing and ensuring program quality? List at
DedPeter [7]

Answer:

the two limitation i can think about is the efficiency like if there are bugs or glitches or if it can get broken into and the second one is if it is running the correct program or not a lot of people deal with this problem.

Explanation: personally these are the two i can come up with at the moment

4 0
3 years ago
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
When choosing a new computer to buy, you need to be aware of what operating ____a0 it uses.
Lana71 [14]

Answer:

operating system

Explanation:

There are a lot of operating systems in the market. Ubuntu, red hat, windows, apple Macintosh etc. The choice of an operating system changes all the version of software used in the system. Therefore, while choosing a computer one must be aware of the operating system used in it.

7 0
3 years ago
Which of the following is not an acceptable way to code a nested structure? Select one: a. nest a for loop inside a while loop b
kirill115 [55]

Answer:

nest an else clause within an elif clause

Explanation:

in python Programming, we cannot nest an else clause within an elif clause. elif is actually else if condition. we cannot nest another else with in elif clause.

8 0
3 years ago
Other questions:
  • The key invention that enabled computers to go into every home and office is
    7·1 answer
  • Search engines enable you to
    13·2 answers
  • In 1948, a Bell Labs researcher named Claude Shannon wrote a technical report in which he proposed that all information media co
    11·1 answer
  • What software development model focuses on improving the product in small steps each time through the cycle?
    14·2 answers
  • C++ what is wrong with my equation?
    10·1 answer
  • You are developing open-source software based on existing source code developed by someone else. What is the term for the piece
    9·1 answer
  • In 5-10 sentences, describe the procedure for responding to an e-mail message.
    5·1 answer
  • Core to resource management system is the _________that coordinates the server hardware.
    8·1 answer
  • How dose computers it use the information to solve problems
    6·1 answer
  • I don't want my large video files using up all my hard drive space . can i archive my videos in on dvds or blu rays?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!