1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
2 years ago
14

The information computers give to users or other computers are called

Computers and Technology
1 answer:
AfilCa [17]2 years ago
7 0

Answer:

the output processed data

You might be interested in
Let’s say you’re publishing a message with the Hootsuite Composer. The message contains a link to a landing page, and you want t
myrzilka [38]

Answer:

Ow.ly shortener

Explanation:

Ow.ly is a good example of a link shortener that helps shorten the UTM link in Hootsuite composer.

Cheers

6 0
3 years ago
How to divert all calls & sms from other phone to my phone? is it possible?
gayaneshka [121]
<h2>Answer:</h2>

It is possible in case of calls. SMS cannot be diverted to other numbers.

<h2>Explanation:</h2>

Every mobile manufacturing company has its own settings features and every cellular network has its own codes yet the facility of call forwarding which is a phone feature that enables users to forward or redirect incoming calls to any alternate number, which may be either a land line or cellular number. This facility can be availed by going to the Setting menu, then call setting and looking for call forwarding option. Once you get to the call forwarding option, select the destination number where you can divert the calls received on your number. Unfortunately sms cannot be diverted.

4 0
4 years ago
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
Look at the logos below, decide which one would be the most suitable to use for a Cooking App? Please explain your reason below.
den301095 [7]

Answer:

The logo on the top right

Explanation:

It's pretty obvious :/

Everything else is not related to baking or cooking (kiiiinda excluding taco bell, but thats a fast food chain)

6 0
3 years ago
IaaS providers do not manage the ____
murzikaleks [220]

Answer:

1. C

2. A

Explanation:

IaaS which is also known as Infrastructure as a service is an outsourced cloud computing infrastructure service that offers resources such as storage, server, and network connections. Examples of IaaS providers include organizations like Microsoft’s Azure and Amazon Web Service which is also commonly known as AWS. Azure, AWS are among a list of IaaS providers that offer support through monitoring and management of remote datacenters. Instead of physically purchasing hardware and servers, businesses can opt to host all their services and operations on the cloud.

The PaaS falls between IaaS and SaaS. Most developers and programmers working for big cooperates rely on PaaS to help them code and provide cloud components to applications and software. PaaS makes all the phases of program development and deployment easier and cheap. It can manage what IaaS supports like storage, virtualization, servers, and network connections. In addition, PaaS providers can manage operating systems and databases as well. Note that it is the work of the developers to manage the applications and not the PaaS providers

6 0
4 years ago
Other questions:
  • FINISH THE SENTENCE <br><br> buzzfeed____reddit_____
    5·1 answer
  • Before you enable data deduplication, what tool can you use to determine if data deduplication would benefit the tested volumes
    11·1 answer
  • Which tool is best used to test an electrical current for a power source?
    8·1 answer
  • What is a job that was created by automobiles
    9·1 answer
  • Create 2 methods of your choice.
    5·1 answer
  • Rules used by a computer network<br> A network protocol <br> B hierchary protocal<br> C procedure
    7·1 answer
  • 3<br> Select the correct answer.<br> What is the output of the following HTML code?<br>Please
    8·2 answers
  • What will be the output of using the element in the given HTML code?
    6·1 answer
  • Canada’s energy plan, named __________, makes three governmental agencies accountable for safeguarding Canada’s environment.
    5·1 answer
  • The analysis of attempting to solve a problem with information systems is called ________.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!