1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
14

. Use of communications and information systems that are familiar to users is a part of which key principle? A. Security

Computers and Technology
2 answers:
disa [49]3 years ago
7 0

Answer:

B. Reliability, Scalability, and Portability  

Explanation:

  • Communications and information systems should be reliable, scalable and portable in any kind of situation and event.
  • These systems should be pertinent to users and user-acceptable, quickly adjustable and compliant to new technology, and reliable in any type of event.
  • These systems should be scalable. Scalability ensures that programs can be extended to accommodate any event and enables the respondents to readily add more number of users in a system. It supports multiple events which include multiple respondents and support staff from multiple agencies.
  • These systems should be portable. Portability simplifies and enhances the communication of distinct and separate systems. The portable technologies and protocols facilitate the installation, utilization, implementation, transportation and delivery of communication and information systems. It allows the respondents to use common equipment which they are familiar of, even if they are working on an event outside their area.
KonstantinChe [14]3 years ago
4 0

Answer

Option B.Reliability, Scalability, and Portability.

Explanation:

Use of communications and information systems that are familiar to users is a part of Reliability, Scalability, and Portability.

So option B is correct one

You might be interested in
What is a functional simulation?
Anika [276]
D) a type of training that allows...
4 0
4 years ago
Who else hates it when Edgenuity has technical problems with international students?
konstantin123 [22]

Answer: ya it sucks

AI used to be a A student until edgenuity had to be used.

Explanation:

7 0
3 years ago
Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.
dimaraw [331]

Answer:

SCSI.

Explanation:

It is a set of ANSI-developed simultaneous interface requirements for connecting scanners, drives, printers, and many other devices to systems.

Although when Tim has such an outdated network system which is used as a backup by his corporation. Then hard drive may have gone wrong and required replacement. The connector used by the hard disk drive is not something he has ever seen before, but he upload photos of that on the community board of the organization to aid determine what kind of hard disk drive they will also have to order.

So, according to the following scenario he required SCSI cable.

4 0
4 years ago
Which phrase best describes a folder in Outlook 2016?
svetoff [14.1K]

Answer:

The phrase that describes the best folders in outlook 2016 is:

An organizational container.

Explanation:

The reasons behind this answer are that in the first place the folder allows the user to group emails, contacts, tasks, or even a calendar. So, because this is not only for emails or files. It is an object that can group several types of things and create a new category. Instead of only applying for certain objects. Thus, it is an organizational container. Because the first the third, and the fourth option describe objects that can only group-specific objects instead of all of them. There is no flexibility in the rest of the answers.

5 0
3 years ago
What is 1gb in bits?​
Irina-Kira [14]

Answer:

8e+9

Explanation:

3 0
4 years ago
Read 2 more answers
Other questions:
  • AMSCO networks plans to conduct a poll of viewers during the SuperBowl. They will conduct analysis to determine which area of th
    6·2 answers
  • What will happen with communication methods in five years?
    8·1 answer
  • You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O
    10·1 answer
  • Why is it more secure to require a user to press ctrl+alt+delete to log on rather than displaying the windows welcome screen?
    15·1 answer
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • What area on the Microsoft® Publisher® application screen shows the name of the publication?
    9·1 answer
  • p3_unzip :: [(a,b)] -> ([a], [b]) Write a function that takes a list of two-tuples and returns a tuple of two lists -- the fi
    9·1 answer
  • "which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without th
    7·1 answer
  • Define a function in Scheme (or relation in Prolog) that checks whether a set of elements (represented as a list) is a subset of
    10·1 answer
  • When installing a Windows 10 an already installed Windows 7 what happen​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!