1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
7

The high-speed communication links that span the globe over land and under sea make up the Internet _____.

Computers and Technology
1 answer:
UkoKoshka [18]3 years ago
8 0

Answer:

fiber-optic

Explanation:

You might be interested in
I need someone to transfer this into a database in excel Please help :D 7 pts
sergejj [24]
What kind of database?
6 0
3 years ago
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
ANEK [815]

<u>Answer</u>:   B. Identify the source of the active connection

<em>Any problem can be fixed only finding of the source of it. We can fix a problem in ‘n’ number of ways but it might again come back if source of it is not identified.</em>

<u>Explanation:</u>

Identify the source of the active connection is the NEXT step the team should take. It is very similar to our human body.

If the infection is coming in the body again and again and gets fixed in the treatment, the reason for come - back will be identified so that it does not <em>lead to unnecessary treatment. </em>

In a similar way, if source are identified then the problem of come-back can be avoided. <em>So option B would be the right choice.</em>

4 0
3 years ago
Which kind of a person will you be if you prove to be accountable for your actions?
Black_prince [1.1K]

Answer: You would be a person of integrity.

Explanation: Look up Integrity for details.

3 0
3 years ago
7.4.1C The global distribution of computing resources raises issues of equity, access, and power. Briefly describe one of these
nika2105 [10]

It has been accentuated. An organization is a system consisting of: people, material resources and information, being the last, the nerve center of the previous two that allows the survival of these. This statement refers to the most recent conceptions defended by the Information Management (IM), in the sense that organizations should be considered primarily as information systems.

Lynda Woodman's definition of IM states that "management is everything that refers to obtaining the right information, for the right person, at the right price, at the right time and place, to make the right decision."

As for the MIR, part of the assumption of recognition that information is a resource, a value that should be managed like any other, because among the similar characteristics we have:

* acquired at a cost and chargeable in money

* has specific and measurable characteristics

* control of the cost of information,

* has a life cycle,

* ability to be processed and refined, etc.

For Elizabeth Adams "the MIR is a function of top management, to develop a series of policies, programs and procedures to effectively and effectively plan, manage and control the information needs and support resources of information management." In this directive task, the components that participate and the areas in which the person responsible for it must operate are:

1.- information resources: that is, identification, evaluation and use of these, not only internal but also external.

2.- Appropriate technology: to collect, store, retrieve or disseminate information.

3.-management: general planning, human resources, communication, accounting and marketing.

In today's world, there is a tendency to grant special treatment to everything that is related to information; and it is this situation that gives rise to the importance of the management / management of information resources (MIR).

This era of information, characterized as significant changes, flexibility, uncertainty and the "great battles" (for competitiveness, leadership, competition, reduction of uncertainty and risk, etc.), it is necessary to keep updated as soon as to the significant changes that occur in the technology of products and processes, as well as in their management and competitiveness patterns.

We live in an era where the common denominator of progress will be the wise application of information, science and technology, in the production of goods and services for the satisfaction of social needs, as well as the adequate use of resources to increase the wellbeing of society and man. In others, words, we are talking about the correct management of information.

Information management is the new name of the development. Are the professionals (librarians, documentalists) ready to accept the challenge? We believe that information professionals are in an adequate situation, have knowledge, resources, capacity and conditions to maintain a sustainable leadership in the organization of information, but they have to determine what they believe their position should be and fight for it. We must start from the basic criteria, restructure the concept of the information scientist to adapt it to the new, complex and changing needs of the organization and the community.

6 0
3 years ago
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • Why is a networked system a benefit?
    7·1 answer
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • What will you see on the next line after the following lines of code?
    12·1 answer
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
    12·1 answer
  • 7. Type the correct answer in the box. Spell all words correctly.
    8·1 answer
  • Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!