1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
9

" _____ is a measure of the amount of information that can travel from a user to the Internet in a given amount of time."

Computers and Technology
1 answer:
Ainat [17]3 years ago
6 0

Answer:

The answer is Upload bandwidth

Explanation:

Bandwidth refers to the highest transfer rate of data on an internet connection or network.

Upload bandwidth is the amount of data that moves from a computer to the internet or a network within a given amount of time. Documents, music files, video files, software and so on can be uploaded to the internet or a network.

You might be interested in
What types of actions exist in activity diagrams?<br>​
iragen [17]

Answer:

Activity Diagrams

Activity. An activity diagram illustrates one individual activity. ...

Action. ...

Calling an Activity (Action) ...

Accepting an Event (Action) ...

Accepting a Time Event (Action) ...

Sending Signals (Action) ...

Edge (Control Flow) ...

Decision Node.

Explanation:

8 0
3 years ago
Ill mark you the brainleist and give you 50 points if you wanna chat
tekilochka [14]

sure! what do you wanna chat about?

6 0
3 years ago
It is very easy to change data into charts<br> what is a Microsoft Excel Microsoft Outlook or both​
Vadim26 [7]
It’s microsoft Excel
8 0
3 years ago
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
1)A popular and useful tool for strategic planning is SWOT analysis. SWOT stands for
Blizzard [7]

1. strengths, weakness, opportunities, threats

2. protecting the privacy of others

3. this behavior can create divisions on the team.

4. creating a schedule for workflow

7 0
3 years ago
Other questions:
  • A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
    9·1 answer
  • For a typically large organization how many dns servers should you install
    5·1 answer
  • Based on the Pizza database you imported, complete the SQL statement below to add the column VIP to the customers table. The cus
    8·1 answer
  • Match the tool to the task it helps to accomplish. Thesaurus allows the user to find the synonyms and antonyms of a word Smart L
    8·1 answer
  • If you need to grasp the topic of a document quickly, which strategy can you follow? A. guessing from context B. paraphrasing C.
    7·2 answers
  • IOS 0R ANDR0ID ???
    13·1 answer
  • My computer keeps on logging me out when i try to answer a question on brainly. Can somebody please explain why. And give a good
    12·2 answers
  • Alcohol first impairs your ____?
    12·2 answers
  • 87. Labor Department surveys show a close relationship between job<br> security and
    9·1 answer
  • OH GOD PLEASE HELP I CAN'T FIGURE THIS OUT-
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!