Una línea donde vas ordenando los hechos que han sucedido hasta el presente, aquí te dejo un ejemplo
•___________________________•
P. N. E. HISTORIA
A. E. D
L. O. M
E. L
O. I
L. T
I. I
T. C
I. O
C
I
Answer:
C. CMR systems
Explanation:
CMR or customer relationship management is a strategy that uses data analysis of customers to manage the interaction between a company and current and potential customers.
It analyses the data of client from different channels like wesites, email, social media,telephone log etc, describing and predicting potential decisions to be made to enhance customer service and acquisition.
Answer; Electric Paper Display
Explanation:
<em>"PDs are extremely thin and only require power when a new image is requested. Instead of a traditional display that uses backlighting to illuminate pixels, an EPD is based on the scientific phenomena known as "electrophoresis," the movement of electrically charged molecules in an electric field."</em>
Above is the definition, as you can see it resembles your question greatly so this is most likely the answer you're looking for.
Good luck :D
Answer:
A. Android and iOS
Explanation:
The two most frequently used operating systems on the tablets are Android and iOS. They are most famous operating systems currently. ios is used by apple hence it's tablets also known as ipads are on ios and other companies like samsung,motorola ,lenovo,hp etc. uses Android operating system on tablets.
Answer: symmetric encryption
Explanation:
The Secure Sockets Layer (SSL) protocol is required by the Web servers and the web browsers in order to protect the data of the users during transfer through the creation of an encrypted channel that is unique for private communications that occur over the Internet.
The Secure Sockets Layer relies on the encryption in order to secure the link that exists between the client and the server which is the website.
This implies that the encryption and also the decryption of the data will be done using a cryptographic key that is shared. The cryptographic key will be generated and shared on accordance with transport layer security handshake.