1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
12

Miriam is very detail oriented within the first month of her new job as a network support specialist she became very good at dia

gnosing and fixing problems with the network Miriam’s motivation to improve soon earned her a raise
Computers and Technology
1 answer:
love history [14]3 years ago
3 0
What is the question?
You might be interested in
List three things to be safer online.
kenny6666 [7]

Answer:

1. do not give out your age

2. don't use your real name unless you are supervised

3.dont put all your information out there

5 0
2 years ago
Examples of ________, which is hosted on a web site, include e-mail, word processing, tax preparation, and game programs.
Keith_Richards [23]

Answer:Web Application

Explanation:Web hosting is more or less like having an ordinary computer in the cloud in order share information and resources with others world wide.One cannot make effective use of a computer without software applications . Similarly hosting just normal html pages and documents on a server cannot help increase productivity,hence the creation of cloud computer applications also known as "Web Apps (Web Applications)" to aid boost productivity and information dissemination via quality task automations.

4 0
2 years ago
What should you keep in mind when adding contents to your digital portfolio?
sveticcg [70]

Answer:

The contents of the portfolio will depend on individual education, work experience and future goals

Explanation:

The contents of the portfolio will depend on the following -

a) Work biography/experiences

b) Career goals

c) personal details

d) contact information

e) Professional photograph

f) Relevant skills

g) Relevant documents, certificates, degree etc.

etc.

4 0
3 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Different methods of developing useful information from large data bases are dealt with under
oee [108]

Answer:

The answer to this question is option "d".

Explanation:

In this question, the answer is data mining. Because Data mining is a technique that finds a piece of new information in a lot of the data. In the data mining collecting information from data is hopefully both new and useful. Data mining help us to discover new patterns and relationship in data to help make better decisions. It is used everywhere like Television and radio, Banking, Retail, and business. That's why data mining is useful.

4 0
3 years ago
Other questions:
  • In your presentation you added a text box to?
    5·1 answer
  • Here's a thought: Why does your Brainly ranking keep going down?
    6·2 answers
  • What is the difference between primary storage,secondary storage and offline storage what type of storage can be
    6·2 answers
  • Did this technological advancement take away or create jobs? Overall, what was the contribution of this technological advancemen
    12·1 answer
  • A computerized spreadsheet program is useful for
    6·2 answers
  • Which of the following statements represents the number of columns in a regular two-dimensional array named values?
    9·1 answer
  • Define a function that takes two arguments: a string called strText and a number called intNumber. This function will use a repe
    12·2 answers
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • Pa sagot po TLE-10<br>need den po Ng solution thank you​
    14·1 answer
  • After data is collected, how is it analyzed?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!