1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
4 years ago
6

List three types of technical information sources that an IS professional might use when researching a new storage technology an

d selecting specific products that incorporate that technology. Which information?
Computers and Technology
1 answer:
drek231 [11]4 years ago
7 0

Answer:

The three types of technical information sources are:      

Vendor and manufacturer Web sites.

Technology-oriented Web sites and publications.

Professional society Web sites.              

Explanation:

Professional society Web sites provide most unbiased information.

These professional social websites are non profit companies as opposed to other sources of information that are profit making.

Social websites provides with the information that can help their members in a best way about getting information of their interest. This is done in an unbiased way because they do not work for some specific organizations or companies that want to sell their products or services.

You might be interested in
A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you b
umka2103 [35]

Answer: Application layer

Explanation:

Application layer of OSI(Open system interconnection) that is responsible for interfacing the communication with the user by displaying information or message. It maintains the transmission of file and assessment, emailing faculty, using network services etc.

  • According to the question,if any Skype user has complain regarding video call drop while conferencing then application is responsible to solve the issue.
  • This layer will be the starting point of troubleshoot by approaching to network resources.As call drop can occur due to network service, congestion or resource issue.
4 0
3 years ago
Previously, our password was 8 characters and included only lower-case letters. Now, because of changing requirements, we genera
BARSIC [14]

Answer:

7 characters.

Explanation:

Here we have 26(small letters)+26(capital letters)+10(number from 0-9)=62

As we are having more number of possibilities for each character of the password, We will need a smaller length to reach the same or better level of security.

If we take 6 characters long password we will have 626 = 56,800,235,584‬ possibilities, which is less secure than the previous 8 characters long password.

But if we take 7 characters long password we will have 627 = 3,521,614,606,208 possibilities, which is almost 17 times larger than the previous password and has a smaller length when compared to the previous password.

3 0
3 years ago
What language used orthogonality as a primary design criterion?
pogonyaev
LIPS a functional language is one in which computations are made primarily by applying function to given program
4 0
4 years ago
When you right click a picture in a word processing program, which actions can you choose to perform on that image?
Juliette [100K]

1 - A

2 - B

I hope this helps!

8 0
3 years ago
With the development of IEEE 802.1x port security, the _________ authentication server has seen even greater usage.
Licemer1 [7]

Answer:

RADIUS.

Explanation:

RADIUS:- It's full form is Remote Authentication Dial-In User Service.It is a software and a protocol for client/server that lets the servers having remote access to communicate with the central server so that it can validate dial-in users and it can authorize their accessibility to the system or service they requested .

It provides better security.It lets an organisation or a company to maintain profiles of the users in a central database so that it can be shared by the remote servers.

6 0
4 years ago
Other questions:
  • Which of the following is true of an enterprise search software? Select one:
    5·1 answer
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • Jorge is sending a large image file to a friend as part of a shared classroom project. Which of the following is most likely tru
    11·1 answer
  • An ideal line length would include how many characters? A. 6570 B. 100 C. 100125 D. 4055
    8·1 answer
  • When would it be easier to use Cut and Paste over Drag and Drop? Explain?
    6·1 answer
  • Select the correct answer.
    9·1 answer
  • What are folders within folders called​
    8·2 answers
  • Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio
    5·2 answers
  • Give five example of a dedicated device ​
    9·2 answers
  • How to get the whole number of a fraction in python
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!