1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
7

With which type of media are you interacting when you read an online shopping website?

Computers and Technology
1 answer:
AfilCa [17]3 years ago
3 0
Digital media/social media. Normally through ads
You might be interested in
Isla is writing a report on the best roller coasters in America. Which device could help her with this?
Ulleksa [173]

Answer: a device that can help could be a map.. she could learn about that place then see if its coasters are better.

Explanation: i dunno if i'm right

~shina~

4 0
3 years ago
Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in
andrey2020 [161]
Outline View. This view shows only the text of all the slides in the presentation on the left pane, enabling Anna to see whether she has put too much information or not.  She can also directly edit the the text  and simultaneously see its effect on the slide.  
8 0
3 years ago
Read 2 more answers
Which of the following are incident priorities?
xenn [34]

Answer:

what are the options?

reply in comment so i can help:)

5 0
3 years ago
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Tems11 [23]

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

4 0
3 years ago
_____ crime involves the use of computers and the internet to commit acts against people, property, public order, or morality. v
den301095 [7]
Hi,


Answer => Cyber


Good Lessons
6 0
4 years ago
Other questions:
  • Collaboration, listening, and negotiating are considered _____ skills.
    5·1 answer
  • Presentation guidelines state that slides should have no more than bullet points.
    9·2 answers
  • You easily can give slides in a presentation a professional and integrated appearance by using a placeholder.
    11·1 answer
  • Below is the prototype for a function that takes two pointers to integer variables as its parameters. The purpose of the functio
    14·1 answer
  • The e-mail address of any third party recipient of an e-mail belongs in which field?
    8·1 answer
  • True or False: Nanomemory applies to computers.
    13·1 answer
  • What are the peripherals of a computer ​
    12·1 answer
  • How are hyperlinks created and used within a presentation? Check all that apply. Hyperlinks are set to open another source file.
    7·2 answers
  • Calculate the value of z. Given v=4, w=5, x=8, y=2z= (v+ w) * x / y;print (“value of z is “, z)
    8·1 answer
  • You are building a game that needs to do the following:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!