1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
6

if you get a messge online saying you just won a game you just need to give ame email address and phone number to have it shippe

d what should you do
Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
6 0

Answer:

block the number and cancel all notifications form that scammerrr

Explanation:

You might be interested in
The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont
DaniilM [7]

Answer:

<em>The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the types of information systems. </em>

Read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

  • Operating systems fundamentals

An operating system is the fundamental software which is needed to run a hardware every electronic hardware need an instruction set to make the hardware working. We can say that operating system is communication medium between the user as well other software to the hardware. Hardware don’t know the language of user and user don’t know the language of hardware how to give instructions to the hardware to perform some specific task so Operating system do this functionality to meet the needs of both user and hardware.

  •  The applications of the OS

Applications of operating system are following  

  • Security

Operating system make sure that all the user data is secured and an unauthorize source cannot access the computer to make any changes in user data or any other program.

  • Communication b/w application software and user

The other application of operating system is that it provides a communication channel b/w user and other application program by using some sort of compilers, interpreter to meet the user needs.  

  • File Management

Operating system also provide an essential feature of managing files. It provides complete directory and easy navigation of files and their usage access. It keeps track that where the information is stored and all other details that thing is known as file system.

  • Device Management  

Operating system also keep track of all the devices connected to it install their respective device drivers if available and make them available. OS do communication with the devices connected to it and then perform instructions via hardware and allocate which instruction set should be assign to which device.

  • Processor Management

OS control the multitasking feature of the processor. It makes an order of list of all the tasks which need to be done on processor and assign them according to there priority and also manage for how much time that task is assigned to the processor.

  • Error Detecting

OS keep track of all the information of the health of the computer and detect errors if available to avoid malfunctioning of the computer.

  • The Embedded OS

Embedded operating system are specially designed operating system which are used to for special purpose hardware/embedded system. These OS are more efficient than the simple OS and have limited features. They are designed to be compact and resource efficient. It perform real time operations and very responsive to the instructions. In our daily life ATM machine have an embedded OS, smart phones also have and in medical like MRI machine.  

  • Information system architecture

The information system is defined as formal definition of the business processes, product technologies and working system structure and other technical framework for a business organization. Information system architecture have four layers “Business Process Architecture”, “System Architecture”, “Technical Architecture” and “Product Architecture”.

Information system architecture consist of the software and hardware used to meet the consumer needs. It consists of a documented detail of software hardware used and networked and future plan to add some other features if needed to upgrade or change the system.

  • Cloud computing

Cloud computing is defined as on demand availability of computer resources over the network/internet like storage, software or processing without using the current system all the work is done on a system far away which is available on internet and can be accessed from anywhere. For such services there are data centers which store data on servers to make them available to there user.  

Cloud computing have some types like SaaS (Software as service), Storage, Database, Security, Platform as service.

4 0
3 years ago
An auxiliary view is always projected from the view that shows the inclined surface as a(n) _____.
ValentinkaMS [17]
Auxiliary section i think
8 0
3 years ago
What is Geocortex and how does it work in web or mobile?
RoseWind [281]

Explanation:

Geocortex -

Geocortex mobile is the framework which is a native application for the different mobile OS such as iOS, Android, and Windows. It is built on the version of Esri’s ArcGIS Run time SDK for the .NET.

The Geocortex mobile Designer which is a browser-based configuration tool which is designed to simplify the experience combined with the Geocortex mobile, can make this the work leading framework and building the mobile offline apps on the Esri’s ArcGIS Run time .

The Geocortex mobile framework has many features which are building cutting-edge apps from the browser and optimizing the apps for mobile and also offline environments. We can also use the Geocortex Workflow for building the end-user interactions and also for any business process .

6 0
3 years ago
An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
salantis [7]

Answer:

No padding

Explanation:

64 bytes is taken as the minimum Ethernet frame, this encompass checksum as well as addresses in the Ethernet frame header and length field. while the maximum Ethernet frame is 1518 bytes, any minimumEthernet frame that is short compare to that will need receiving stations to interpret it as a collision. The question specified that the IP packet to be transmitted by Ethernet as 60 bytes long. The header fields here can occupy 18 bytes, Then total frame size becomes 78 bytes. With the total frame size of 78 bytes(60 bytes+ 18 bytes) we can see it has exceeded the 64-byte minimum. Hence there is no padding used.

6 0
3 years ago
You can use this area to create your resume.
Svetach [21]

Answer:

what area?

Explanation:

if you need help creating a resume lmk :)

all you really need is

your skill set

-what you're good at

-what you can do

-what are you certified at like

excel, Microsoft office etc.

let me know and I'll send an example

3 0
3 years ago
Other questions:
  • What channel will the republian debate be broadcast on?
    6·2 answers
  • A ____ is approximately a billion bytes.
    9·1 answer
  • Help! I turned on my computer and this screen came on out of nowhere, I don't know what to do to fix it.
    11·2 answers
  • Is techonalygy harmful or useful
    6·2 answers
  • Explain why it is important that software products are developed and delivered quickly. Why is it sometimes sensible to deliver
    14·1 answer
  • What was the first edition of the internet?
    7·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • Body positioning is an example of what type of communication?
    6·1 answer
  • When an AC voltage is being measured
    15·1 answer
  • Everyone in a healthcare organization has the responsibility to prevent abuse and neglect from occurring no matter what his or h
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!