1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina-Kira [14]
3 years ago
6

Most of us have been using elements of Web 2.0 without even realizing it. True False

Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
5 0

Answer: True?

Explanation:

I’m pretty sure I’m new to that stuff

You might be interested in
In addition to meeting OSHA standards, the Department of Defense requires each military department, including the Department of
professor190 [17]
The correct answer is: DoD Instruction 6055.1 which is known as DoD Occupational Safety and Health Program.

<span>In addition to meeting OSHA standards, the Department of Defense requires each military department, including the Department of the Army, to administer a comprehensive safety and occupational health program. The requirement appears in this document.</span>
3 0
3 years ago
What term describes a wireless network topology in which access points work as peer devices on the same network?
kumpel [21]
Mesh WLAN wireless mesh network WMN describes a wireless network topology in  access points work as peer devices on the same network.
<span />
7 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
What will the document.write() statement display, given the following code snippet? var scores = new Array[94, 90, 88, 82, 73, 7
astra-53 [7]

Answer:

There are 7 scores recorded. The dropped score is 75

Explanation:

The code snippet above prints through the document.write() function. the output prints the string serving as the argument, and makes use of variables (lgth) and expression also (scores [lgth -1]). what it does is. From the point where it sees +lgth+, it checks the value, which is 7. And when it sees scores [lgth-1] it evaluates it to 75. Hence, the string above is produced.

4 0
3 years ago
State why hexadecimal is used to display the error code
maxonik [38]
“Hexadecimal uses digits that more closely resemble our usual base-10 counting system and it's therefore easier to decide at a glance how big a number like e7 is as opposed to 11100111. Higher information density. With 2 hexadecimal digits, we can express any number from 0 to 255.”
7 0
4 years ago
Other questions:
  • If you were optimizing for performance and wanted to support potentially adding many new elements to an adt, then:
    12·1 answer
  • What are some ways social media networks make money from users
    10·1 answer
  • you just bought a new hard drive for your computer, you plan to use this secondary hard drive to store all school work files. on
    13·1 answer
  • Make a program (C++). Sum of a 4 digits number and eliminating last digitsȘ
    13·1 answer
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • Which is a tool that allows you to copy formatting from one place and apply it to other places?
    9·1 answer
  • A store sells rope only in whole-foot increments. Given three lengths of rope, in feet, the following code segment is intended t
    13·2 answers
  • Which cable would you check if you can't access any web pages?
    12·1 answer
  • Complete the output for the following program?
    10·1 answer
  • You are asked to write a program that prompts the user for the size of two integer arrays, user input for the size must not exce
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!