1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
4 years ago
11

9. What is composition? Why is composition important?

Computers and Technology
1 answer:
Veronika [31]4 years ago
4 0
Composition- a work of music, literature, or art

This is important because art helps people express oneself
You might be interested in
Explain four sitting postures in a computer laboratory​
Flura [38]
1. Push hips back
2. Adjust seat
3. Sit up straight and roll your shoulders back
4. Feet flat on floor
8 0
3 years ago
In order to access the internet, it is not necessary to have an Internet Service Provider (ISP).
loris [4]

Answer:

False!

Explanation:

You <em><u>have</u></em> to have an Internet Service Provider in order to access the internet! (I also got this right in my test)

<em><u>Hope this helps :]</u></em>

8 0
3 years ago
Read 2 more answers
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
4 years ago
What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
cluponka [151]

A world  have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.

<h3>What is internet?</h3>

Internet is the system  uses the Internet protocol suite (TCP/IP)  and interconnected computer networks that communicate between two or more individuals.

Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task  is not possible without it. Even a simple task can be done using internet.

Learn more about internet.

brainly.com/question/13308791

#SPJ1

5 0
2 years ago
Other questions:
  • The         provides access to the Internet; may also be internal
    5·1 answer
  • Using tracking code, Google Analytics can report on data from which systems? A. E-commerce platforms.B. Mobile Applications.C. O
    11·1 answer
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • How auto insurance companies manage risk?
    12·1 answer
  • Which html attributes are required in the image () element - check as many as apply
    9·1 answer
  • A typical item in a plan of procedure includes the name of the part of the ______ to
    5·1 answer
  • Knowing and understanding the targeted audience is a main compnent to creating a website
    15·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
  • Un polímero sintético es renovable o no renovable
    11·1 answer
  • How does the technology affect you daily living? Give situations where you use technology and how it helped you.​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!