1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
14

What structures in which lighting heating and other systems are controlled by computers

Computers and Technology
1 answer:
Ilia_Sergeevich [38]3 years ago
8 0

Museum !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

You might be interested in
Dynamic programming does not work if the subproblems: ___________
nirvana33 [79]

Answer:

A. Share resources and thus are not independent

Explanation:

This would be the answer. If this is wrong plz let me know

6 0
3 years ago
Which key must be pressed in addition to clicking on a hyperlink for it to be followed?
iogann1982 [59]

The key you need to press together with the click to be able to redirect to a hyperlink is the Control key.

In an electronic environment, a hyperlink is usually a word or phrase, highlighted in blue and underlined, or even an image, found in a web text and containing the command to "transfer" the user to another relevant web page, from the source node to the destination node.

By selecting this word or phrase the user has the ability to further research a topic from a variety of perspectives to compare information from different sources and actors.

Learn more in brainly.com/question/7620368

7 0
2 years ago
Why do you feel an organization has multiple layers of security in place to protect its operation?
aalyn [17]

The purpose of including multiple layers in your network security<span> is to make sure that </span>each single defense component has a backup<span> in the case of a flaw or missing coverage. The individual strengths of each layer also cover any gaps that other defenses may lack.</span>

With this assumption in mind, each individual layer in a multi-layered security approach focuses on a specific area where the malware could attack. By working in concert, these layers of security offer a better chance of stopping intruders from breaching company networks than using a single solution.

The types of security layers you can use in your network defense include:

<span>Web protectionPatch managementEmail security and archivingVulnerability assessment and analyticsAntivirus softwareData encryptionFirewallsDigital certificatesAnti-spam and spam filtersPrivacy controls</span>

<span>Having multiple layers of security in place is crucial for MSPs who protect data at all levels and across numerous applications and devices. Not only should data stay safe, but so should the methods of communication and the network where information is transferred.</span>

4 0
3 years ago
Which statement correctly explains why televisions became less bulky?
REY [17]

Answer:

The old cathode Ray tube technology was replaced by the less bulkier and more modern liquid crystal display and LED technology.

Explanation:

The old cathode ray tube uses the principle of electrical discharge in gas. Electrons moving through the gas, and deflected by magnetic fields, strike the screen, producing images and a small amount of X-rays. The tube required more space, and consumed more electricity, and was very bulky. The modern technologies are more compact and consume less power, and can been designed to be sleek and less bulky.

3 0
3 years ago
What legal punishment can people face for plagerism
Maru [420]
They can get a fine.
5 0
3 years ago
Other questions:
  • Lux Ladies, Inc., is a company that specializes in expensive and unusual gifts for all occasions. It keeps a large file of infor
    11·1 answer
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • A package that includes hardware, software, and support from a single vendor is called a(n ____ package.
    6·1 answer
  • Some numbers are formed with closed paths. the digits 0, 4, 6 and 9 each have 1 closed path and 8 has 2. None of the other numbe
    6·1 answer
  • Please help quickly!!! which of the following is not a peripheral?
    8·2 answers
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • What can a scientist do if he repeats and experiment and gets diffrent results?
    5·1 answer
  • What is the value of 8n when n= = 2?​
    13·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • What is the index of 7 in this list?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!