1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
4 years ago
9

Before the electronic era information was usually directly communicated and not recorded, much of the information you received w

as ________.
Computers and Technology
1 answer:
cluponka [151]4 years ago
6 0

Answer:

Direct voice communication.

Explanation:

Electronics, compared to electrical appliances are low powered logical devices, which uses digital signals of 1s and 0s to represent voltage range. The evolution of these devices have promoted information technology from high quality digital signal transmission to recorded speech platform.

Speech signals could not be recorded before the electronic era, it was only disseminated from one person to another to converted to text for easy and uncorrupted information transfer.

You might be interested in
Match the vocabulary to the appropriate definition.
Allisa [31]

Answer:

Pulling related code together in objects is Arrays

Helps programmers when they revisit code or are new to code-- Documentation

Explanation:

This is all I know

3 0
2 years ago
In c please
Paraphin [41]

Answer:

#include <stdio.h>

#include <ctype.h>

void printHistogram(int counters[]) {

   int largest = 0;

   int row,i;

   for (i = 0; i < 26; i++) {

       if (counters[i] > largest) {

           largest = counters[i];

       }

   }

   for (row = largest; row > 0; row--) {

       for (i = 0; i < 26; i++) {

           if (counters[i] >= row) {

               putchar(254);

           }

           else {

               putchar(32);

           }

           putchar(32);

       }

       putchar('\n');

   }

   for (i = 0; i < 26; i++) {

       putchar('a' + i);

       putchar(32);

   }

}

int main() {

   int counters[26] = { 0 };

   int i;

   char c;

   FILE* f;

   fopen_s(&f, "story.txt", "r");

   while (!feof(f)) {

       c = tolower(fgetc(f));

       if (c >= 'a' && c <= 'z') {

           counters[c-'a']++;

       }

   }

   for (i = 0; i < 26; i++) {

       printf("%c was used %d times.\n", 'a'+i, counters[i]);

   }

   printf("\nHere is a histogram:\n");

   printHistogram(counters);

}

5 0
3 years ago
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
HELP BRAINLIEST FOR RIGHT ANSWER
Scilla [17]

Answer:

true I know this cuz I smart

7 0
3 years ago
Read 2 more answers
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the
GarryVolchara [31]

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

3 0
3 years ago
Other questions:
  • True or false words spelling and grammar check is always %100
    7·2 answers
  • A good reference point for determining the position of a line or curb in front of you is your __________ . A. Hood ornament B. L
    10·1 answer
  • What are some good websites i can use to test my knowledge?
    11·2 answers
  • Create a class named Console, and move all the methods that retrieve and validate user input to that class. These methods can re
    7·1 answer
  • Gigantic Life Insurance is organized as a single domain. The network manager is concerned that dividing into multiple domains to
    15·1 answer
  • Vpn stands for _____. very precise settings virtual private network virtual public network vice prestigious setup
    5·1 answer
  • Please tell fast plzzzzzzz​
    11·1 answer
  • Using the Insert tab, you can convert text into a table and a table into text.
    15·1 answer
  • I NEED A BIG BRAIN BOYO TO HELP ME
    14·1 answer
  • This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!