1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
9

Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents.

Computers and Technology
2 answers:
Vsevolod [243]3 years ago
6 0
<span>Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents. 
The answer is a. True 

</span>
user100 [1]3 years ago
4 0
The statement "Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents" is true. This is correct because there are many types or media that can be taught to people and the only one that matters is on how they understand and interpret these information to gain knowledge.
You might be interested in
A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email,
Nadusha1986 [10]

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

6 0
2 years ago
Different methods of developing useful information from large data bases are dealt with under
oee [108]

Answer:

The answer to this question is option "d".

Explanation:

In this question, the answer is data mining. Because Data mining is a technique that finds a piece of new information in a lot of the data. In the data mining collecting information from data is hopefully both new and useful. Data mining help us to discover new patterns and relationship in data to help make better decisions. It is used everywhere like Television and radio, Banking, Retail, and business. That's why data mining is useful.

4 0
3 years ago
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling,
Fittoniya [83]

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

7 0
3 years ago
Mariel types a sentence. She then decides to include that sentence four more times. She then decides she only wants the sentence
Minchanka [31]
CTRL Z and CTRL Y
(undo)_____(redo)
8 0
3 years ago
Read 2 more answers
Which of the following lists the stages of the four-stroke engine cycle in the correct order of operation?
kvasek [131]
The answer is (a) Intake, Compression, Power, Exhaust.
The fourth-stroke engine cycle or the commonly known as the four cycle is a type of engine that completes four separate strokes while turning a crankshaft. First is the Intake where the piston begins at TDC. Second is the compression where it begins at BDC and the piston compresses the air-fuel mixture for ignition. Third is combustion where the second revolution of the cycle starts. Last is the exhaust where the piston once again returns to TDC from BDC.
6 0
3 years ago
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • The value 8/10 in a cell refers to which of these?
    5·2 answers
  • Collaborative filtering is
    10·1 answer
  • Which letters appear in the home row on a keyboard?
    14·2 answers
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException
    11·1 answer
  • The following code processes a file containing five positive numbers. What will the variable $result contain after the code is e
    10·1 answer
  • The command prompt found on Windows 7 and Windows 8 is very similar to the interface of what past operating system?
    5·1 answer
  • Cuales son las paginas web​
    12·1 answer
  • The IPv4 address scheme has enough IP addresses to give every blade of glass in the world its own unique IP. True False
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!