1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
13

Post secondary education refers to:

Computers and Technology
1 answer:
Musya8 [376]3 years ago
4 0
The answer is C I have taken this class before
You might be interested in
Context-based signatures match a pattern of activity based on the other activity around it, such as a port scan. true and false
valina [46]

Answer:

The given statement is "True".

Explanation:

  • Context-based signatures become wired networks on either the incoming packet's information. Documentation included within the IP headers has been used to stimulate a certificate or stamp based on the scenario.
  • The whole category of signatures examines congestion and how much it appears to fit through the other pedestrians which mostly surrounds it.

So that the above is the true answer.

7 0
3 years ago
What should you do when asked to take down a detailed message for your manager or supervisor?
katovenus [111]
A makes most sense to me. What if you forget that a voicemail was left? Its better to have them call back later. And if the manager isn't there in an hour have them then leave a voicemail.
8 0
3 years ago
Read 2 more answers
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
Give 8 examples of Synchronous communication
SpyIntel [72]

Answer:

Synchronous communication examplesinclude: instant messaging, video conferencing, webcams, MUDs, MOOs, chat, Second Life. Examples of one-to-one synchronous communication include: instant messaging. Examples of one-to-manysynchronous communication include: video conferencing, MUDs, and MOOs.

5 0
3 years ago
Which of the following is true? ADebit Cards often have a higher interest rate than Credit Cards. BChecks are the most widely ac
zimovet [89]
<span>A: Debit Cards often have a higher interest rate than Credit Cards.
B: Checks are the most widely accepted form of payment
C: Cebit cards offer the highest level of fraud protection.
D: Checks and Debit Cards both withdraw money directly from a bank account

If you only have one choice then c:
b: only in the US
a: is wrong, Debit card have no interest rates.</span>
8 0
3 years ago
Other questions:
  • Smartphones store their operating system software in ________.
    11·1 answer
  • The Tab dialog box helps you set tabs in your word processing document. What does this dialog box control the movement of when y
    15·2 answers
  • A call center company wants to implement a domain policy primarily for its shift workers. The call center has large groups with
    11·1 answer
  • Network layer functionalities can be broadly divided into data plane functionalities and control plane functionalities. What are
    8·2 answers
  • The __________ method can determine whether a string contains a value that can be converted to a specific data type before it is
    12·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • Which of the following is an easy steps to take to avoid ESSD well working on your computer?
    5·1 answer
  • 7.3.4: Find the Error
    7·1 answer
  • Why would you choose a mobile device over a laptop? 1-2 sentences.
    11·1 answer
  • Which 2 tools are useful to remote employees and coworkers.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!