1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
7

__________ is a set of rules and guidelines for acceptable online behavior.

Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
6 0
Data protection protocol can also be used in this scenario I have done it before it works
You might be interested in
What are the examples of computer software​
jonny [76]

Answer:

Examples of modern applications include office suites, graphics software, databases and database management programs, web browsers, word processors, software development tools, image editors and communication platforms. System software. These software programs are designed to run a computer's application programs and hardware.

Explanation:

Hope this helps :)

Have an amazing day <3

Pls mark brainliest :p

3 0
3 years ago
Read 2 more answers
Summary about Interface Design in system analysis
Anit [1.1K]

Answer:

Explanation:Systems Analysis

It is a process of collecting and interpreting facts, identifying the problems, and decomposition of a system into its components.

System analysis is conducted for the purpose of studying a system or its parts in order to identify its objectives. It is a problem solving technique that improves the system and ensures that all the components of the system work efficiently to accomplish their purpose.

Systems Design

It is a process of planning a new business system or replacing an existing system by defining its components or modules to satisfy the specific requirements. Before planning, you need to understand the old system thoroughly and determine how computers can best be used in order to operate efficiently.

System Design focuses on how to accomplish the objective of the system.

System Analysis and Design (SAD) mainly focuses on −

Systems

Processes

Technology

5 0
2 years ago
Describe the benefits and drawback of using virtualisation on a single machine and also in a cluster environment
Sedbober [7]

Answer:

 Virtualization is the technology that is used to create virtual representation and version of the different devices like software, many storage devices and server.

It also help in organize the working framework where the structure isolates the asset into at least one execution situations.

 The benefits of using the virtualization on the single machine are:

  •  The virtualization increased the productivity when it used in the cluster environment.
  •  We can able to access the different resources faster.
  •   The data center management is simple while using the virtualization in the cluster environment.

 The drawback of using virtualization on single machine are:

  • The virtual machine is less efficient as compared to the real machines.
  • The virtual machine indirectly access the computer hardware system so that is why it is less efficient and also consume more power to run the system.  

5 0
3 years ago
How do transformers work?
Umnica [9.8K]
A transformer will either step up or down to the necassary voltage using a core wrapped in a coil of wires.
8 0
3 years ago
Read 2 more answers
he Correct Coding Initiative (CCI) edits contain a listing of codes under two columns titled, "comprehensive codes" and "compone
iragen [17]

Answer:

The answer is "Option C"

Explanation:

The content management system promotes the accurate coding technique, which is used to monitor incorrect encoding, in which the comprehensive code is used, that compiles the code to defining or covering two or more CPT part code, packaged as one package, that's why "option c" is correct and other were wrong which can be defined as follows:

  • In option A, It is wrong because code can't be a component code.
  • Option B and Option D is wrong because it uses a comprehensive code only.

7 0
3 years ago
Other questions:
  • In an open computer network such as the internet, hipaa requires the use of _____. in a closed system such as a local area netwo
    7·1 answer
  • A virus that attaches to an executable program can do anything that the program is permitted to do.
    7·1 answer
  • Needed urgently what are short cut keys
    8·2 answers
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    8·1 answer
  • Long-tail keywords are:
    9·1 answer
  • which artists work provides visual effects to enhance the action of an animated movie , film, or video
    11·1 answer
  • HURYYYY
    6·2 answers
  • Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write
    10·1 answer
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
  • true/false: the american standard code for information (ASCII) is a code that’s allows people to read information on a computer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!