The correct answer is 1: B new tech and 2:C we can tell by the way businesses are incorporating things like social media like how Wendys got more popular because of their sassy tweets
Spatial representation allows information to be viewed at a glance without needing to address the individual elements of the information separately or analytically.
<h3>What do you mean information?</h3>
- Information is a stimulus with meaning for the receiver in a specific situation.
- Data is a broad term that refers to information that is entered into and stored in a computer.
- Data that has been processed, such as formatting and printing, can be interpreted as information again.
- When you communicate verbally, nonverbally, graphically, or in writing, you are passing on knowledge gained through research, instruction, investigation, or reading the news.
- Information is known by many different names, including intelligence, message, data, signal, and fact.
- Information helps to avoid study duplication. Information stimulates the cognitive processes of users, particularly scholars.
- Scientists, engineers, academics, and others benefit from the use of information.
To learn more about Information, refer to:
brainly.com/question/4231278
#SPJ4
Answer:
a. 255.255.255.0 (class C)
b. 255.255.255.224
Explanation:
Here, we want to give the implied subnet mask of the given classful IPV4 address
We proceed as follows;
Given IPv4 address: 200.200.200.200
Classes
Class A : 0.0.0.0 to 127.255.255.255
Class B: 128.0.0.0 to 191.255.255.255
Class C: 192.0.0.0 to 223.255.255.255
Class D: 224.0.0.0 to 239.255.255.255
so 200.200.200.200 belongs to Class C and it's subnet mask is 255.255.255.0
In CIDR(Classless Inter Domain Routing)
subnet /27 bits means 27 1s and 5 0s. so subnet
i.e 11111111.11111111.11111111.11100000 which in dotted decimal format is 255.255.255.224 .
Answer: Access control
Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.
The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.
ICS would bet he answer.
Good luck! (: