1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
4 years ago
12

Which advertising medium has the widest reach on a global front?

Computers and Technology
1 answer:
lesya [120]4 years ago
8 0

Answer: B

The internet would allow businesses to easily expand globally with the help of social media and the ever expanding resources being poured onto the internet, reaching customers anywhere in the world.

You might be interested in
Whats important about the points?
likoan [24]
You can earn ranks! That is important.
8 0
3 years ago
Read 2 more answers
Erica has always selected large numbers of cells by clicking and dragging her mouse. A shortcut that she could use is to select
labwork [276]
D. enter because if you enter something on a cuputer or laptop your selecting something
5 0
3 years ago
A _________ is a series of commands and instructions that you group together as a single command to accomplish a task automatica
melamori03 [73]
A macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically.
8 0
4 years ago
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Komok [63]

Answer:

Agentless NAC

Explanation:

An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.

Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.

An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.

3 0
4 years ago
If anyone know python code, your answer will be valuable.
Veseljchak [2.6K]

Answer:

Explanation:

B

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which is a function of network media?
    11·2 answers
  • By changing the field size for text to the maximum number necessary,
    6·1 answer
  • How can a wiki contribute to an academic paper?
    9·2 answers
  • What term best describes the way the dns name space is organized?
    9·1 answer
  • Which ORDER BY clause causes 10 rows to be retrieved from the result set, starting with the 20th row?
    5·1 answer
  • Want to.learn about computers​
    9·1 answer
  • Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
    9·1 answer
  • Write a Java statement to create an object LG of class TvSets
    11·1 answer
  • Which of the following tasks could be implemented as a filter using only a constant amount of memory (e.g., a couple of int or d
    8·1 answer
  • ANSWER QUICKLY!!! <br><br> Which aspect of planning is a preventive action?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!