1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
6

A __________ network is good for connecting computers over boundaries.

Computers and Technology
2 answers:
mel-nik [20]3 years ago
6 0
Answer: C. wide area 

<span>For computer connection, a wide area network (WAN) provides good connection over a large-scale geographical boundary for it can connect to different smaller networks, which includes local area networks and metro area networks. This way, users of computers in similar location and other location can establish a good connection.</span>

Vinil7 [7]3 years ago
3 0
<span>A </span>WAN (wide area network) is a communications network that spans a large geographic area such as across cities, states, or countries. <span>They can also be composed of smaller LANs that are interconnected. </span><span>The Internet could be described as the biggest WAN in the world. </span>
You might be interested in
Which of the following explains why computers can be used in accounts payable? Computers can use random steps to identify the du
Sphinxa [80]

Answer:

Its A buddy

Explanation:

that what it was on ingenuity

4 0
3 years ago
Read 2 more answers
Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, ma
juin [17]

Answer:True

Explanation:

Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence.Data in its raw form does not help managers in reaching their business decisions. In this electronic age data collection has been made simple .However the value of that data can only be seen when it is processed and it becomes information. It can help managers to make quick business decisions that will be used to make come up with important business strategies  .It follows that when data is collected in its various forms it should then be processed meaning that the business managers can either use business Intelligent software  that can present the data in a meaningful form like graphs . pie charts and other forms that can be easily interpreted and reflect the trends that have been presented by the raw data .The organisation should find value in the data that they have collected and tell the story that leaves in the data.

7 0
3 years ago
Which step do you think is most useful from big data life cycle.why?
12345 [234]

Explanation:

Business xase evaluation is most useful because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements.

Mark me brainliest

7 0
2 years ago
11 of the 25 people on the bus get off at the first stop. What percent best represents the portion of the bus that got off on th
miskamm [114]

Answer:

44%

Explanation: First, you have to divided 11 by 25. Which is 0.44. And then you multiply the quotient by 100 to get your percentage.

5 0
3 years ago
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
Other questions:
  • a _____ is a recreation of a thumbnail in a desktop publishing software, also known as a "rough". a. proof b. digital draft c. l
    15·1 answer
  • Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped th
    7·1 answer
  • All information is clearly identified and easy to find within the source
    15·1 answer
  • Ted knows that macros can be helpful to him in his work with Excel spreadsheets,but he also knows they have their hazards,so he
    15·1 answer
  • Laura is using a rent to own store to purchase a computer valued at $1,000. She is paying $25 per week for 104 weeks(2 years). W
    13·1 answer
  • Based on the module,
    9·1 answer
  • Which of the following is not a reserved keyword in python?​
    13·1 answer
  • What are the determinants of price elasticity of demand?​
    11·2 answers
  • Poob bn vbyfcfgxfc jghjg jhgh
    12·1 answer
  • True or False: Once you rename a field, the new field name must be used in the rest of the search string.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!