1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
3 years ago
11

Help please and thank you

Computers and Technology
1 answer:
Setler [38]3 years ago
3 0
To protect the organism
You might be interested in
GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
ki77a [65]

Answer:

an enterprise architecture

Explanation:

Based on the information provided within the question it can be said that in this scenario it seems that GenXTech is creating an enterprise architecture. This is a blueprint made for a company that illustrates and defines all the finer details regarding the structure and operation of an organization, as well as where the organization should be heading in order to achieve the business goals that have already been set.

6 0
2 years ago
When replacing a system board in a laptop, which feature is a must?
Marta_Voda [28]

Answer:

Having the integrated peripherals in the same locations as the old system board

Explanation:

System board is the printed circuit board that is used to connect the peripheral devices. It provides the slots and ports to connect the peripherals devices.

If there is a need to replace the system board of the laptop. You can change the system board. On new system board, all the peripherals that are installed on previous (old) system board should be placed on new system board. As the system requirements are same, only printed circuit board of the system is changed.

The new system board is replica of the previous board so, we can not change peripheral of the system boards.

5 0
3 years ago
Did this technological advancement take away or create jobs? Overall, what was the contribution of this technological advancemen
mars1129 [50]
It took away jobs and made day to day tasks easier
3 0
3 years ago
Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
Len [333]
I do not know spanish please say in english
5 0
3 years ago
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
2 years ago
Other questions:
  • Consider the following sequence, defined from n=2 to 15 (inclusive). Pn=n2−1. Produce a list named primes which only contains va
    10·1 answer
  • Mention 3 wast water draining system on home​
    7·1 answer
  • Jeremy’s office is in an earthquake prone area. His web server is in his office. What step should he take to protect the data on
    5·1 answer
  • I forgot to tell it’s on Roblox for those who play and wanted to be friends and new ppl username is mosarider489
    9·2 answers
  • Which snippet of code is in XML?
    5·1 answer
  • Write a function that accepts an argument for a persons name. The method should loop through the number of characters in the nam
    7·1 answer
  • Select the correct answer.
    9·2 answers
  • In the digital age we have less time to absorb and make sense of new information
    12·2 answers
  • Consider the following code segment.
    11·1 answer
  • An if statement must always begin with the word “if.” True False python
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!