1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
9

What trends do you see in the industry in 2010? For example, if there were more or fewer jobs created by travel and tourism, rep

ort that in your answer and explain why the numbers changed.
Computers and Technology
2 answers:
Artemon [7]3 years ago
8 0
Travel jobs started to rise as well , photography business has been growing more and more every year allowing them to travel more to get shots or advertise their work (small companies) , chefs have always globally traveled
Setler [38]3 years ago
4 0

Answer:

i saw phones and more social media being used mobile gaming was also invented

Explanation:

me smart birb

You might be interested in
To conserve its public IP addresses, a company can instead use ____ addresses for devices within its own network boundaries.
Thepotemich [5.8K]

Answer:

private ip addresses

Explanation:

A private ip address is assigned to each device on a network, allowing devices on the same network to communicate with each other without using any public ip addresses.

7 0
2 years ago
A site has been issued the IP address of 192. 168. 10. 0/24. The largest network contained 25 hosts and was given the lowest num
dimulka [17.4K]

Answer:

Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.

Explanation:

Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.

4 0
2 years ago
What is the simplest way to permanently get rid of an unwanted file? A. Go to the Start menu and then delete the file. B. Erase
vazorg [7]

C. Send it to the recycle bin and empty the recycle bin
7 0
3 years ago
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
3 years ago
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det
Marrrta [24]

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

6 0
3 years ago
Read 2 more answers
Other questions:
  • If Mark is developing a website to be optimized for mobile devices, what would be the top-level domain?
    10·1 answer
  • Which of the following information sources was not directly affected by the Telecommunications Act of 1996?
    12·1 answer
  • The use of digital technology and the Internet to execute the major business processes in the enterprise is called
    11·1 answer
  • A file name extension provides what information about a file?
    6·1 answer
  • Please help!!!! will mark brainliest!!
    7·2 answers
  • Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6
    13·1 answer
  • Pls help help me is good help me helping is very good
    10·1 answer
  • Disadvantages of a grain crusher
    15·1 answer
  • When was the first analog device, the phonautograph, launched?
    14·1 answer
  • Lenny copied and pasted content from a commercial website into his research paper without citing his source, passing the work of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!