1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
4 years ago
8

In what way would web-based applications be useful to organizations?

Computers and Technology
1 answer:
SIZIF [17.4K]4 years ago
8 0

Answer:

to share information through e-mail messaging

to increase trafficking through their web sites

to facilitate the use of desktop virtualization

Explanation:

The organization employees can share the information via an email client like outlook express as well. However, if the email option is included within the web application then it will be a kind of expeditating communication or speed up communication, as the users can mail from within the web application itself. And the web application does serve as a website as well, and hence can help in increasing the trafficking. And since its a sort of SaaS, it does facilitate the use of desktop virtualization. However, the purpose of the web application can change only with the new version, or else it is not possible. And hence, the fourth option is not legitimate fully. And hence, the correct options are as mentioned above in the answer section.

You might be interested in
Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
LenKa [72]

Answer:

This is Elijah from FLVS hihi :DDDDDDDDDDDDDDDDDDDDDDDDDDDDD CVS

Explanation:

6 0
3 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
What is the code for this please?​
elena55 [62]
What you mean code like a escape room I need more info
8 0
3 years ago
Why authentication processes and features important
vladimir2022 [97]

Answer:

<u>Authentication processes</u> are extremely important because they are an extra layer of security. These processes can help keep networks secure by only permitting authorised users to access them. <u>Authentication processes</u> can be used on things such as networks, databases, websites and other network based services/platforms.

Explanation:

3 0
4 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Other questions:
  • Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
    9·1 answer
  • Which function is used to display a string value to the screen?
    8·1 answer
  • The common field cricket chirps in direct proportion to the current tem­perature. Adding 40 to the number of times a cricket chi
    14·1 answer
  • business ethics chapter 7 jordan, a software engineer, is responsible for maintaining the private piece of his company's interne
    15·1 answer
  • Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?
    15·1 answer
  • What is network management?
    12·1 answer
  • You and a friend have just started a small business. How could you use the Internet to make your business successful?
    15·2 answers
  • Explain how power surges can affect computers and how this problem can be minimised or removed<br>​
    9·1 answer
  • HELPPPPPOOP
    11·1 answer
  • What features should you present when demonstrating 2023 murano’s confident cornering?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!