1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
5

How might your use of computers and knowledge after technology systems affect your personal and professional success

Computers and Technology
1 answer:
vlabodo [156]3 years ago
7 0
You can get a job working as a software/ computer engineer. You can maintain servers at google. These people make lots and lots of money
You might be interested in
With a DUI charge on a driver’s record A. the price of his/her insurance greatly increases. B. he/she may drive only during day
Dmitry_Shevchenko [17]
D. Choice 1 and Choice 3 :)
6 0
4 years ago
Read 2 more answers
If a user’s current directory is /home/mary/project1, which command could she use to move to the etc directory directly under th
kykrilka [37]

Answer:

Option 4 is the correct answer to the above question.

Explanation:

In the Linux operating system, The etc folder is listed on the root directory. When any user wants to go in the root directory of the Linux operating system from anywhere, then he needs to follow the command of the name of the folder where he wants to go with the '/' symbols. The above question states that the user wants to go to the etc folder of the root directory, then he needs to press the command '/etc' with the help of cd command because cd command is used to open any folder. So the option 4 is the correct, while the other is not because--

  • Option 1 states about cd which gives the error.
  • Option 2 states about cd /home/mary/etc which take the user to the etc folder which is in the mary folder.
  • Option 3 states about the cd etc which is used to take the user on the etc folder which is in the current folder.
  • Option 5 states about the cd\etc which gives the error.
8 0
3 years ago
Learning design software, applying to college and creating a website to showcase work are examples of _____________ that lead to
mariarad [96]

Answer:

Web designer

Explanation:

A Web designer is someone who knows about some programming languages like HTML, CSS or JavaScript, but in website development, there are two main areas, in this case, Front-End and Back-End.

A web designer uses Front-End because it only elaborates on the system's view and all about the view for the users.

7 0
4 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
The undo function allows the user to cancel up to _____ previous typing actions
valina [46]
It can cancel up to 40 times.
4 0
4 years ago
Read 2 more answers
Other questions:
  • Suppose an array with six rows and eight columns is stored in row major order starting at address 20 (base 10). If each entry in
    8·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • All queries have a locale, true or false?
    15·1 answer
  • Which software is used for cover letters and resumes
    9·2 answers
  • Can Anyone put my name in binary code using these images? Bentley is my name
    8·1 answer
  • Consider the following code:
    13·1 answer
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • Suppose a class Car and its subclass Honda both have a method called speed as part of the class definition. rentalH refers to an
    5·1 answer
  • How would you identify communication equipment?
    10·1 answer
  • Why are business types of profession interrelated?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!