1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
3 years ago
10

Que es lo que me recomiendan estudiar? :v

Computers and Technology
1 answer:
trapecia [35]3 years ago
5 0

Answer:

Informática O Tecnología de la información O Electrónica. Puedes hacer maravillas con estos. Puede comenzar un curso en cualquiera de las transmisiones, pero tenga en cuenta sus habilidades y considérelas al seleccionar una de las anteriores. Si quieres hacer un pequeño curso. Puedes hacer un curso de alojamiento web o computación en la nube. Pero siempre aprende un idioma aparte de estos definitivamente. Además, siga aprendiendo vocabularios de todos estos. Eso te convertirá pronto en una personalidad, que nunca se aburrirá. Lea muchos blogs y artículos sobre estos a diario también.

Explanation:

La respuesta se explica por sí misma.

You might be interested in
Select the correct answer.
storchak [24]

Answer:

B. Planning

Explanation:

I believe the developer establishes the project goals in the planning phase.

6 0
4 years ago
What are some catchy names for computer basics that you would put on a childrens poster?
Triss [41]

Answer:

not sure

Explanation:

6 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
If a file is opened for reading and the file does not exist,what action is taken?
worty [1.4K]

Answer:

C)An error message is issued.

Explanation:

If we try to open a file for reading when that file does not exist, we will get an error message.

For example, in Java we will encounter a FileNotFoundException as in the code below:

       try {

           FileInputStream fis = new FileInputStream("myFile.txt");

           DataInputStream dis = new DataInputStream(fis);

           BufferedReader br = new BufferedReader(new InputStreamReader(dis));

           String str = null;

           while ((str = br.readLine()) != null) {

               System.err.println(str);

           }

       } catch (FileNotFoundException e) {

           e.printStackTrace();

       }

If the file myFile.txt does not exist we can expect to see an exception stack trace corresponding to FileNotFoundException.

8 0
4 years ago
In cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multiply the number of shares
irakobra [83]

Answer:

Answer is attached. If you have any further questions, feel free to ask. I also completed the total investment value.

Download xlsx
6 0
3 years ago
Other questions:
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • In 1–2 sentences describe the purpose of comparison operators and give an example.
    10·1 answer
  • An example of java code for a sandwich shop menu
    13·1 answer
  • The number 1 represent what state in binary code
    9·1 answer
  • Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use i
    15·1 answer
  • What is the possible output from system.out.println((int)math.random() * 4)?
    8·1 answer
  • our grandmother tells you a dollar doesn’t go as far as it used to. She says the “purchasing power” of a dollar is much less tha
    6·1 answer
  • This road sign means
    14·2 answers
  • Discuss the factors which cause imbalance in the environment.
    8·1 answer
  • A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is m
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!