1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
11

Describe some ways that you personally use information technologies differently than you did just a few years ago

Computers and Technology
1 answer:
Bond [772]3 years ago
8 0
This is a personal question that cannot really be answered by someone else...

Think about new tools/softwares you have picked up over the past years whether it be as simple as Microsoft Word or Excel, or more advanced technologies such as programming languages, DBMS, or operating system tools such as task scheduler to automate things.

Personally, I have started using software to help develop and deploy software while collaborating with teams such as Git, Jira, GitHub/Bitbucket, and Bamboo. I have also become more proficient in Python and learned more about full stack development in JavaScript.

Again, depending on your personal experiences and the context of the question, this answer will vary.
You might be interested in
If a company uses multimedia applications in addition to normal file and database sharing, which transmission is more efficient?
Sonbull [250]

The transmission that is more efficient is the full duplex transmission.

<h3>What is database?</h3>

A database simply means an organized collection of a structured information in a computer program.

In this case, when a company uses multimedia applications in addition to normal file and database sharing, the efficient transmission is the full duplex transmission.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

3 0
2 years ago
Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another cowor
Dvinal [7]

Answer:

a software program for storing, managing, and retrieving information

Explanation:

8 0
2 years ago
A(n) ____ , a type of idps that is similar to the nidps, reviews the log files generated by servers, network devices, and even o
kobusy [5.1K]
An LFM IDPS

Using an LFM which stands for log file monitor, the system is able to review log files generated by servers, network devices, and even other idpss. Its main purpose is to look for signatures and patterns which might indicate that an intrusion is in the pipeline or has already happened.
This intrusion detection is enhanced due to the fact that LFM is in a position to look at several log files from different systems.




8 0
3 years ago
What is an ISP?<br> in computer Networking
defon
ISP is an abbreviation for internet service provider.
Hope this helps!
4 0
3 years ago
Read 2 more answers
Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services dep
sineoko [7]

Answer:

The correct answer to the following question will be Option 3 (Professional bureaucracy).

Explanation:

  • Professional bureaucracy is evidence that uncentralized organizations can be administrative. Their organizational function is reliable, culminating in "preconceived or repetitive actions, in essence, uniform."It's also very complicated, and so the operators who are doing it should be regulated.
  • Mintzberg's organizational framework categorization classifies the information-based organization where services and goods depend as a highly qualified bureaucracy on both the knowledge and expertise of experts.

The other alternatives are not related to the structure of the Mintzberg. So choice 3 is the correct answer.

8 0
3 years ago
Other questions:
  • which software is used to mimic intricate hand drawings into digital paintings? _____ is used to replicate hand drawings into di
    7·1 answer
  • Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down
    8·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • 1. It is acceptable to use a jack that has been
    13·1 answer
  • Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
    6·1 answer
  • whenever I try to make an account it says it can't sign me up at this time or something- can you help?-
    10·1 answer
  • The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it o
    7·1 answer
  • How to use boolean to check if math answer is correct java
    7·2 answers
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!