1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
13

Tom is the aerobics coordinator at a fitness center. He needs a more efficient way for his instructors to share information. Cla

ss schedules are updated on a regular basis. Instructors need to indicate when they cannot teach a class and other instructors need to be able to sign up to cover the class. Also, instructors often attend training classes and learn new procedures. Having a place to share their learning and update procedures will benefit them and their clients. Cindy is taking a business class and told Tom about a great tool that will serve their needs. What was the technology tool Cindy told Tom about?
blogs
firewalls
wikis
e-mail
Computers and Technology
2 answers:
goblinko [34]3 years ago
7 0

Answer:

I would said that is WIKI

zlopas [31]3 years ago
4 0
I think a wiki would be the best resource for them here. It allows anyone to add and update information. Firewalls are for security, blogs are generally single-post content, not updated, and e-mail is a bit of a clunky way to do it if you have a lot of rapidly-changing content.
You might be interested in
Wireless data networks are particularly susceptible to known ciphertext attacks.
sesenic [268]

Answer:

The answer is TRUE

Explanation:

Wireless data networks uses wireless connections to send information to end users. Information here, are shared within a far distance. Mobile cell phones use wireless networks. Wireless network can be targeted from a distance and are therefore susceptible to attacks among which are ciphertext attacks.

Ciphertext are necessary way of coding a data to prevent readability which in turn would ensure the protection of the data. However, an attacker could attack wireless data networks using ciphertext attacks by decrypting any ciphertext  through the knowledge of the secret key or encrypted key and through a handful of some encrypted messages.

5 0
3 years ago
2. Who created the first photograph? How was this done?
fenix001 [56]
<span>Nicephore Niepce produced the first permanently fixed photograph made with a camera in 1826. </span>
4 0
3 years ago
Read 2 more answers
What is the difference between algorithm and program?
Dennis_Churaev [7]

Answer: The difference is that an algorithm is a precise step-by-step plan for a computational procedure that mainly begins with input value, yields, and output value. While a program is instructions written in code to explain to a computer what to do. Like how the CPU can send a command to the GPU to tell it what image to make. The better the CPU the better and faster it can read and complete it's given instructions.

Explanation: Trust me with this.

8 0
3 years ago
What does the following code print?
Crank

Answer:

It throws an error.

the public class needs a name.

like this:

public class G{ public static void main(String[] args) {

   int x=5 , y = 10;

   if (x>5 && y>=2) System.out.println("Class 1");

   else if (x<14 || y>5) System.out.println(" Class 2");

   else System.out.println(" Class 3"); }// end of main

   }

if you give the class a name and format it, you get:

Class 2

Explanation:

3 0
3 years ago
How do i use a computer (i'm 99999 years old)
AlekseyPX

Answer:

grandma?

Explanation:

is it you?

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which is the output of the formula =AND(12&gt;6;6&gt;3;3&gt;9)
    6·1 answer
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • Given two double variables, best value and second best value, write some code that swaps their values. declare any additional va
    13·1 answer
  • You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on
    8·1 answer
  • What do we call data that's broken down into bits and sent through a network?
    15·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • How was the Big Ben project similar to the investigation you conducted in class to determine if the table was vibrating? How is
    7·1 answer
  • Differentiate between patent and copyright.
    6·2 answers
  • Edit the program provided so that it receives a series of numbers from the user and allows the user to press the enter key to in
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!