1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
15

How has the internet most affected companies and​ customers?

Computers and Technology
1 answer:
slega [8]3 years ago
4 0
By helping effectiveness in communications regarding customer support and customer feedback
You might be interested in
Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
larisa [96]
I think this answer is b
5 0
3 years ago
Read 2 more answers
Define ROM and list the types of read only memories.
Lorico [155]

Answer:

Read-only memory, also known as ROM, is a storage medium used in computers and electronic devices, which allows only the reading of information and not its writing, regardless of the presence or not of an energy source.

The data stored in the ROM cannot be modified, or at least not quickly or easily. It is mainly used to contain firmware (a program that is closely linked to specific hardware, and is unlikely to require frequent updates) or other vital content for device operation, such as programs that start up the computer and perform diagnostics.

There are three types of ROM memories: PROM. EPROM, and EEPROM.

6 0
3 years ago
An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and
Readme [11.4K]

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

7 0
3 years ago
A(n) _________ is a computer system which is part of a larger system which performs a dedicated function.
Helga [31]

Answer:

An Embedded System

Explanation:

In computing, an embedded system (computer) refers to a computer with its complete components (processors, memory, IO devices, and peripherals) with a unique and dedicated role in a bigger system (usually a mechanical or electrical system). Embedded systems are found in cars, airplanes, home appliances, petrol dispensers etc. The technology is behind the Internet of Things (IoTs).

8 0
3 years ago
Assume the following method has been defined:
grandymaker [24]
2. 5  
Looking closely at the function mystery, you should notice that it iterates through the array of strings and counts the number of those strings that have a length greater than the value "x" passed to it. The second piece of code declares and initializes an array of strings and then calls mystery with that array and the value of 5. So it will return the count of words in the string array that have a length greater than 5.  
The strings are: 
aardvark", length = 8, will be counted. 
"banana", length = 6, will be counted. 
"cougar", length = 6, will be counted. 
"daikon", length = 6, will be counted. 
"elephant", length = 8, will be counted. 
"fog", length = 3, will NOT be counted. 
"get", length = 3, will NOT be counted.  
So there will be 5 strings counted. So the answer is "2. 5"
6 0
3 years ago
Other questions:
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • Why are listening and speaking part of the Common Core and ELD Standards? Why is this particularly important for our ELD student
    14·1 answer
  • What does the shell of a operating system do?
    11·1 answer
  • Describing Editing Task
    6·1 answer
  • Idea citizen activation
    9·2 answers
  • Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures i
    7·1 answer
  • ____ is the amount of effort (usually in hours) required to perform cryptanalysis on an encoded message so that it may be decryp
    8·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • Which of the following is an object such as a field which can be inserted into a document
    7·1 answer
  • What is the purpose of HTML?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!