1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
15

1. in terms of technology, we often said to be living in the _____ age.???

Computers and Technology
2 answers:
qwelly [4]3 years ago
6 0
In technology they call it the age of information

sleet_krkn [62]3 years ago
3 0
I think its the new age either that or end times
You might be interested in
Why is it important to save a print copy of electronic sources
AURORKA [14]
I don't exactly know WHY, but I can guess..
I think it's because, if you're writing, you can know where the source is from if you print the WHOLE SCREEN, or just to remember what the electronic source says.
4 0
3 years ago
Which of the following formats can algorithms NOT be written in:
umka2103 [35]
Hello there.

Which of the following formats can algorithms NOT be written in:

Answers: Flow Chart 
5 0
2 years ago
Read 2 more answers
The capital letter Wis expressed as U+0057 in which system?
Paul [167]

The capital letter W is expressed as U+0057 in Unicode system

  • The Unicode system is known as a type of coding system which contains worldwide character encoding standard that gives a code to every character and symbol in every language spoken in the world today.

  • It is known as the encoding standard that is used in all languages, It makes sure that an individual can retrieve or combine data with the use of different languages altogether.

Conclusively, we can say that the The capital letter W is expressed as U+0057 in Unicode system

Learn more from:

brainly.com/question/24736173

6 0
2 years ago
Read 2 more answers
Javascript or java? which one is better?
kifflom [539]
See, one is more or less a toy, designed for writing small pieces of code and traditionally used and abused by inexperienced programmers. 

The other is a scripting language for web browsers. Sorry about my limited knowledge.
3 0
3 years ago
Read 2 more answers
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Other questions:
  • DJ wants to see how his document will look when printed. Where would he find the button to see the document in print view? the P
    5·2 answers
  • When selecting current page from the print range, on the print dialong box it will print
    5·1 answer
  • Mr. Mathis asked his students to add a comment to a cell the students recorded the steps they followed in a chart. Which student
    12·2 answers
  • A sentinel value ________ and signals that there are no more values to be entered:____
    14·1 answer
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • Need help with just #8
    12·1 answer
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
  • Que es una red de datos
    7·2 answers
  • Which of the following tabs on the Ribbon contains the command to add a Quick Part to a document? A Design B Insert C View D Hom
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!