1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
4 years ago
13

What are the considerations that go into representing information digitally? What are the trade-offs? What’s easy? What’s hard?

Why?
Computers and Technology
1 answer:
sineoko [7]4 years ago
3 0
Hello!

The considerations that go into representing data digitally is that the data can be easily sent and interprated to people all over the world. However, one of the trade-offs of representing data digitally is that the information loses a "human" aspect. Instead of experimenting the data, you are simply reading it.

I hope you found this helpful! :)
You might be interested in
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
4 years ago
Which is the best budget motherboard for i3 8100
Nataly [62]
I3 8100 is e best budget
7 0
3 years ago
What do you enter at the command prompt to prevent the shell from using to much of the systems resources?
kap26 [50]

Answer:

Ulimit is the correct answer for the above question.

Explanation:

The Linux operating system is a system on which a user can work on multiple programming system. If a user is working on multiple programs then he needs to set the limit for the system resources so that the system can not access so many resources for any particular program and he can able to access multiple programs. For this a user needs to use the Ulimit command which syntax is as follows--

ulimit [-A] (Where A can be any of them (a, b, c, d, e, f, H, i, l, m, n, p, q, r, s, S, t, T, u, v, x) which refers the type of and units of resources.)

The question asked about the command which is used to prevent to use many of the system resources, then the answer is Ulimit command which is described above.

3 0
3 years ago
. <br> It matters if you capitalize your search words in a search engine<br> True<br> False
Natasha2012 [34]

Answer:

false

Explanation:

search engines really don't care. they'll find the answer almost always whether or not you capitalize things

5 0
3 years ago
What specialized computer program hides the differences in hardware and works a bridge between hardware and appilcations?
VLD [36.1K]

A. hope this helped.

3 0
4 years ago
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    7·1 answer
  • What process combines data from a list with the content of a document to provide personalized documentsWhat
    12·2 answers
  • Which of the following is NOT true about high-level programming<br> languages?
    9·2 answers
  • You are manually configuring a tcp/ip host. another administrator gives you the router's ip address. what is the tcp/ip term for
    6·2 answers
  • Hey! Would you please help me do this program?
    14·1 answer
  • The following is the pseudocode for which type of algorithm? For start = each array subscript, from the first to the next-to-las
    6·1 answer
  • How is digital footprint created ?
    15·1 answer
  • What do we call stores in a physical world?
    13·1 answer
  • suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts wer
    12·1 answer
  • you are using linux and need to perform a reverse lookup of the ip address 10.0.0.3. which command would you use to accomplish t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!