1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
9

Which of the following would an interactive media proffessional must likely need

Computers and Technology
1 answer:
Fudgin [204]3 years ago
8 0
A certificate, an associate of arts degree and a bachelors degree. Hope this helped!
You might be interested in
A technician has been asked to troubleshoot a simple network problem that seems to be caused by software. Which troubleshooting
Anvisha [2.4K]

Answer:

top-down approach should be used.

Explanation:

Top-down troubleshooting approach to a network problem starts from the uppermost network layer and goes down to the deeper layers as the problem continues.

If a layer is in good condition but not all the upper layers, technician can conclude that the problem is within the layer which is above the working layer.

The approach is generally used when it is believed that the problem is within the application layer.  A simple network problem that seems to be caused by software looks an application layer problem, therefore top-down approach is a good method in this case.

6 0
3 years ago
Which one of the following statements referring to mobile Internet
zhenek [66]

Answer: All are true

Explanation:

6 0
4 years ago
Read 2 more answers
Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size
Rom4ik [11]

Answer:

Exactly how many times must the merge function call each of read and write to merge two arrays of size n/2 into an array of size n, assuming

i don t know

7 0
3 years ago
A patient calls the insurance company's call center
chubhunter [2.5K]

Answer:

What is your question?

Explanation:

We need a question to be able to help you...

8 0
3 years ago
Read 2 more answers
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Other questions:
  • Which one of the following downloads and uploads files to and from a server? A. Client B. Internet protocol C. Server D. Worksta
    9·1 answer
  • What is the core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and as
    7·1 answer
  • Which type of tools enable you to choose only a portion of the image
    13·1 answer
  • Once you create a slide show, it is not easy to rearrange things, so you should plan your presentation ahead of time.
    14·1 answer
  • Which function of NOS involves swapping programs and files
    6·1 answer
  • How many different textile items would you find at a festival? (please list 5 items)
    7·1 answer
  • What is command is used to improve the vocabulary and in which tab is it found​
    14·1 answer
  • Which part of project management considers if employees will work at home or in the office?
    10·2 answers
  • Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
    9·1 answer
  • While working on a Windows workstation, you've enabled Remote Desktop.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!