1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
4 years ago
8

Esther has acquired an associate's degree in information technology and certifications in PageMaker and Illustrator. Which caree

r field would be ideal for her?
A. Network Systems


B. Web and Digital Communications


C. Information Support and Services


D. Programming and Software Development
Computers and Technology
2 answers:
Arte-miy333 [17]4 years ago
8 0

It's B.  Web and digital communications

AnnZ [28]4 years ago
7 0

Answer

Web and Digital Communications

Explanation

Information technology is he study, design, implementation, support or management of computer-based information systems .While  Page Maker and Illustrator are the software's used in desktop publishing for the purposes  of designing  e-books, brochures, hand bills, visiting cards and other printing works. So Esther has acquired an associate's degree in information technology and certifications in Page Maker and Illustrator the best ideal career field for her is Web and Digital Communications

The web and digital communication includes  creating, designing and producing of interactive multimedia products and services, including development of digitally-generated or computer-enhanced media used in business, training, entertainment, communications and marketing.

You might be interested in
Use computer magazines and/or the internet to investigate one of these DBMSs: DB2, SQL Server, MySQL, Oracle, or Sybase. Prepare
tigry1 [53]

Answer:

The definition for the problem is listed in the section below on the explanations.

Explanation:

<u>For SQL Server</u>

  • Data Recovery: Data recovery is done well on SQL Server. It is achieved by the restoration method. Behind this, a sysadmin must reconstruct a collection of SQL backups throughout a restore series that is technically right as well as relevant.
  • Data Security: There are several approvals as well as limits for accessing main data objects or databases. These data are accessed only by the approved clients.
  • Concurrency Control: This is essentially synchronization of the evidence or information accessed by multiple users as well as from separate locations.

Concurrency or Competitiveness control becomes accomplished with SQL Server Portable, using locking to further improve security. The locking regulates how multiple individuals can simultaneously navigate & alter shared storage, without interfering with one another.

8 0
3 years ago
A personal business letter may be written by ?
disa [49]

Answer:

a college student inquiring about a loan.

Explanation:

6 0
3 years ago
How does so called marshalling solve the problem of different byte ordering of sender and receiver? 8. What is the purpose of a
Phantasy [73]

Marshalling solve the problem of different byte ordering of sender and receiver by:

  • By the use of Common Object Request Broker Architecture (CORBA):

<h3>What is Marshalling?</h3>

Marshalling is the act of moving and formatting a group of data structures into an external data depiction type good for transmission in a message.

A port mapper is known to be a kind of protocol that tells or map the number or the kind of version of any type of Open Network Computing Remote Procedure Call (ONC RPC) program to a port that is often used in the work of networking by that version of that given program.

Learn more about portmapper from

brainly.com/question/879750

#SPJ1

8 0
2 years ago
A type of authentication that requires the user to provide something that they know, such
bagirrra123 [75]
The answer would be true
5 0
3 years ago
Convert each of the following base 10 &amp; base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
asambeis [7]

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

7 0
3 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • Pat creates a table in a spread sheet
    9·1 answer
  • You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The t
    9·1 answer
  • If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
    9·2 answers
  • A(n) ____ is a location on your computer screen where you type text entries to communicate with the computer’s operating system.
    9·2 answers
  • Which cable would you check if you can't access any web pages?
    12·1 answer
  • When you expand the virtual size of a game, what do you create?
    7·1 answer
  • A user calls to complain that her computer is behaving erratically. Some days it functions correctly, and other days, it crashes
    15·1 answer
  • Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
    14·2 answers
  • A computer professional's job involves analyzing computer systems for
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!