1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
2 years ago
14

Describe the information technology industry today

Computers and Technology
1 answer:
Volgvan2 years ago
6 0

Answer:

The information technology (IT) sector includes companies that produce software, hardware, or semiconductor equipment, and companies that provide internet or related services.

Explanation:

You might be interested in
propose,two new ,proudly South African ways,which you can visualize that the IoT,can be used at work to make life better.
grin007 [14]
1. Internet should be used as a medium of learning.

Through internet, such African people could obtain a lot of knowledge from various fields that provided by more developed countries, and use that knowledge to help the development in south africa.

2. It should be used for utilizing business.

There are a lot of new potential business that could be done because of internet, such as blogging, affiliate marketing, public endorsement through social media followers, etc.
3 0
4 years ago
Type the correct answer in the box. Spell all words correctly.
3241004551 [841]

Explanation:

Only for study

Or open Meet and enter this code: bqa-ivfs-ach

6 0
3 years ago
Read 2 more answers
For the purposes of laying out content, the total height of a box is calculated by adding which of the following?
nordsb [41]

content height and the top and bottom margins, borders, and padding

7 0
3 years ago
What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
igor_vitrenko [27]

Answer Explanation

There are many things to improve the security of business with the help of internet

  • the pillars of business depends upon the information and internet provide security to these information.
  • the computer or laptop which is used for business purpose are secure by internet
  • we use hardware and software firewalls to protect the PC or laptop.
  • we use antivirus to protect the system
  • for runing the computer we uses software firewalls
  • for protection purpose we use hardware firewalls

7 0
4 years ago
A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
irina1246 [14]

The “Allow changes by more than one user at the same time” option.


In a group of users, it is very important to create a shared workbook so that several people are able to update information and track changes in the workbook at the same time. To do so, one should click on the review tab of the excel sheet and select share workbook. On the editing tab of the share workbook dialog box, select the Allow changes by more than one user at the same time check box. Go ahead and click the advanced tab and select option you would want to use and then click OK

 






4 0
3 years ago
Other questions:
  • write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a
    5·1 answer
  • Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
    6·2 answers
  • Programs that are based on ___ graphics record your images on a pixel by pixel basis and will typically save files in formats su
    15·1 answer
  • In 2–4 sentences, describe how you would center text.
    11·1 answer
  • Right click on a spot of your desktop that is not covered by an icon, window, or menu. when the menu comes up, play with the opt
    7·1 answer
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following commands would be t
    10·1 answer
  • 50 POINTS & A FOLLOW!
    11·2 answers
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    5·1 answer
  • Secure shell (SSH) operates over which port by default
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!