1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
7

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional

questions
Online Content: Site 1
What are the two most popular ways people make networking contacts ?
Computers and Technology
1 answer:
Serggg [28]3 years ago
7 0

Answer:

Alumni Groups

Business Organizations

Explanation: i made a 100 on lesson

You might be interested in
Answer: x = 3<br>#1 -2x + 5 = -31​
OLga [1]
#1 answer:X=-18
Mdkdkkdkdkdkkdkdkdk
3 0
3 years ago
(asking again because point-hogs exist)
yawa3891 [41]

The answer is 2-to-the-power-of-n, since for every input, the number of different combinations doubles. From your list I think answer A is meant to indicate 2ⁿ.

6 0
3 years ago
What is a protocol and what are the types of protocol​
wlad13 [49]
A protocol is a set of rules that governs the communications between computers on a network.

1. HTTP or HTTPs. This stands for Hypertext Transfer Protocol or Hypertext Transfer Protocol (secure).

2. FTP (File Transfer Protocol)

3. Email Protocols (POP3, IMAP, SMTP)

4. TCP(Transmission Control Protocol) and UDP(User Datagram Protocol)

Hoped that helped
3 0
4 years ago
Read 2 more answers
Ssl/tls provides security ________. a. between the sender and his or her e-mail server b. all the way between the sender and the
Brrunno [24]
SSL <span>stands for Secure Sockets Layer and TLS stands for </span>its<span> successor Transport Layer </span>Security. They are protocols responsible for encryption and authentication and are  application-layer protocols. SSL/TLS provides security all the way between the sender and the receiver, which means also between the sender and his or her e-mail server . Correct answer: c. both a and b.
7 0
3 years ago
What name is given to the assurance that requested information is available to authorized users upon request
mrs_skeptik [129]

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

5 0
3 years ago
Other questions:
  • Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.
    8·2 answers
  • What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
    5·1 answer
  • Windows server 2012 r2 supports two types of folder shares. what are those two types?
    6·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • Which vendor certification would you think is the most relevant in the field of IT security? Why?
    7·1 answer
  • A. What sectors are used with Foo?
    8·1 answer
  • Minerals that contain the elements silicon and oxygen are called ______.
    7·1 answer
  • Use the drop-down menus to match the description to the correct audio-editing technique or term. deleting unwanted sounds increa
    14·2 answers
  • What is the output of this program?
    10·2 answers
  • Spreadsheets will be displayed as tables in presentations. True or False?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!