1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
6

In​ today's global​ environment, everything and everyone are digitally connected to everything and everyone else. The term used

to describe this is​
Computers and Technology
1 answer:
Rudiy273 years ago
8 0

Answer: IoT(Internet of things)

Explanation: Internet of things(IoT) is the system that consist of the human beings, animals ,computing devices, operating systems and other elements together. In this system these elements are have the unique identifiers for the being separate entity for transferring of the data.

The data transfer in this kind of environment is dependent upon the individuality and not requiring the human to human or human to computer network .

You might be interested in
Does anyone else realize how the only tutor is for math never any other subjects?​
Slav-nsk [51]

Answer:

yes I do and I wonder why ??

7 0
3 years ago
If I wanted to share files only within my organization and limit my employees from sharing information with external people, wha
krek1111 [17]
<span>If I wanted to share files only within my organization and limit my employees from sharing information with external people, what type of network should I set up in my office?

Extranet<====
Internet
Peer-to-Point
Intranet

hopes this helps

</span>
6 0
4 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
The ability of a language to let a programmer develop a program on computer system that can be run on other systems is called
kakasveta [241]
It is called 'portability'.
6 0
4 years ago
What inspired john logie baird to create the television?
weeeeeb [17]
<span>pneumatic tyres is what inspired him to create the television.</span>
6 0
3 years ago
Other questions:
  • Which of these is an on-site metric for social media marketing?
    13·1 answer
  • Its false because I got it wrong
    5·1 answer
  • Choose the false statement below. The content that displays in the browser is contained in the head section. The content that di
    14·1 answer
  • In terms of online safety, what is the grooming process, (predators).
    5·2 answers
  • A7DF is the hexadecimal representation for what bit pattern?
    8·1 answer
  • A browser allows you to set preferences for using the browser. These preferences include all of the following except
    7·1 answer
  • A tornado destroyed many
    6·2 answers
  • How was the Big Ben project similar to the investigation you conducted in class to determine if the table was vibrating? How is
    7·1 answer
  • True or false, USBs are slower than RAM.
    15·1 answer
  • PLZ HELP HELP HELP ME I NEED ANSWER MATH​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!