1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
4 years ago
9

Rachelle is an office manager for an active real estate agency. She’s overseeing a transition to a more complete reliance on ele

ctronic documents and needs a way to make dozens of files readily available to all office staff. What technology can she use to solve this problem?
Computers and Technology
1 answer:
Troyanec [42]4 years ago
8 0

Answer:

She can use <em><u>NAS technology</u></em>

Explanation:

Also know as 'Network-Attached Storage'  is a simple way to store and share documents on a shared network in an office.

One of the earliest forms of NAS began development over 30 years ago when remote file access was developed. From that early stage, NAS has become a very powerful tool in managing corporate information, sharing it and keeping it safe.

Contrary to what many think, cloud storage is not an example of NAS.

You might be interested in
Ask the user to input a country name. Display the output the message “I
Sever21 [200]

Answer:

Explanation:

The following code is written in Python, it asks the user for an input saves it to a variable called country, and then prints out the sentence example in the question using the user's input. The output can be seen in the picture attached below

country = input("input country")

print('I would love to go to ' + country)

4 0
3 years ago
* what is an electronic mail ?
Vikki [24]

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

6 0
3 years ago
MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
ryzh [129]

Answer:

128 bits

Explanation:

The MD5, which is the acronym for Message-Digest algorithm 5, invented by a professor of MIT, Ronald Rivest, is a cryptographic hash algorithm that creates a 128 bit hash value and is typically represented as a 32 character hex number. MD5 is the improved version of MD4 which was also created by the same professor.

Following is an example format of an MD5 hash;

<em>ef55d3a698d289f2afd663725127bccc</em>

MD5 has been proven to have security issues. One of these issues is called collision attack - a situation where the same hash is produced for different input data.

8 0
4 years ago
When you receive a phone call requesting on-site support, what is one thing you should do before you make an appointment?
steposvetlana [31]

Answer:

Ask to the client all the information about the problem and try to solve it by phone.

If its no possible to solve it by phone, then recall all the information about the problem, so the personal doing the on-site supports can pre-diagnose the problem and give an opportunity solution.

4 0
3 years ago
Can a non-void method use the keyword return without returning a value? Explain your answer.
max2010maxim [7]

Answer:

False. A non void method must return something.

Explanation:

No, a non-void method has return statement in it and it returns a value based on the return type in the method declaration and the implementation of that method. Every non - void method has to return a value depending on its declaration. A non void method should have a return statement in it. As it is a non - void method and has return statement in it, it returns a value based on the implementation of that method. If a void method contains return statement in it, the method exits.

6 0
3 years ago
Other questions:
  • 10 facts about turbines
    11·2 answers
  • When a routerâs interface is configured with multiple ip addresses with each address belonging to different networks, what is it
    10·1 answer
  • In a(n) ________ either one condition or some other condition must be met in order for an event to take place.
    11·1 answer
  • Applications require you to provide the following basic elements: availability, social security number, and education.
    14·1 answer
  • According to the SANS Institute, a __________ is typically a document that outlines specific requirements or rules that must be
    13·1 answer
  • What does the doppler effect do?
    9·1 answer
  • What is the safest way to pay online​
    13·2 answers
  • Parts of a computer software
    12·1 answer
  • What construction work is the tender for​
    10·2 answers
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!