1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
15

PLEASE HURRYYY Suppose your employer wants you to purchase a tablet device that you will use to run the company's custom sales s

oftware. The company will reimburse you for the purchase. What is the most important question to ask before making the purchase?
What size screen should it have?

What platform should I get?

Where should I buy it?

What peripherals should I buy?
Computers and Technology
2 answers:
Verdich [7]3 years ago
7 0

Answer:

I would say either platform or peripherals.

Explanation:

Viefleur [7K]3 years ago
7 0

Answer:

Platform

Explanation: I just took it on edge

You might be interested in
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
Hiding data within pictures, audio, or video files can be difficult to detect and find. What can be done to reduce this?
DIA [1.3K]

Answer:

The hiding of the information/data in the images ,videos and audio is referred as stenography This can reduced by taking several steps like:-

  • Extraction method is the widely used method for the separation and picking out the data and the image or other data forms from each other.
  • Hue and saturation method works on the images and audios that  can find the hidden data.
  • Image processing is doen on the image which enhances the form of it by extraction of the unnecessary data from it.

5 0
3 years ago
Referat noaptea la școala cu sfârșit de groază​
solniwko [45]

Te ajut eu daca vrei tu la refera

7 0
3 years ago
Web pages are accessed through a software program called a _____.A) ​web crawlerB) ​web browserC) ​web serverD) ​web app drawer
IrinaVladis [17]

Answer: B) ​web browser

Explanation: A web browser may be explained as a software program or application available on various operating systems such as windows, Mac, Android, iOS among others. This program acts as an interface between information available on websites or pages and users. This application takes a specified uniform resource locator or web address as input and outputs the information available on a web page. Google Chrome, Internet Explorer, Microsoft edge, opera mini, Safari, Firefox and so on.

3 0
3 years ago
What is not critical when you are first designing a database?
Anvisha [2.4K]
The answer is : What the field names will be.   This <span>is not critical when you are first designing a database.  </span>
8 0
3 years ago
Other questions:
  • Which statement is a good reason for backing up your data to the cloud?
    7·2 answers
  • How are the stop lamp bulbs connected in relation to each other? a. In parallel. b. In series. c. In series/parallel. d. None of
    13·1 answer
  • You will be administratively suspended if you have a breath or blood alcohol level of.... or above or refuse to submit to a chem
    12·1 answer
  • When backing up a database server to LTO tape drives, the following schedule is used. Backups take one hour to complete.
    12·1 answer
  • What does phishing mean?
    9·2 answers
  • The most important network device is a ____.
    5·1 answer
  • Identify the characteristics of logic problems.select all that apply
    5·1 answer
  • Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____.
    7·1 answer
  • Bradley is working on a program that uses different classes in specific relationships. Help him remember what these relationship
    14·1 answer
  • Decades of research throughout the world have found a _____ correlation between academic achievement and socioeconomic status, l
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!