1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
4 years ago
5

Home

Computers and Technology
1 answer:
Papessa [141]4 years ago
7 0

Answer:

Enables online download of music

Enables reading while exercising

Reduces the need for printing

Enables sending documents to multiple recipients

Provides savings on travel expenses by supporting virtual meetings

Provides flexible work schedules and environments

Explanation:

You might be interested in
From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
kaheart [24]

Answer:

A) "Identify, document, collect evidence and report to the client or the employer promptly if, in their opinion, a project is likely to fail, to prove too expensive, to violate intellectual property law, or otherwise to be problematic."

B) "Ensure that there is a fair agreement concerning ownership of any software, processes, research, writing, or other intellectual property to which a software engineer has contributed."

C) "Not knowingly use software that is obtained or retained either illegally or unethically."

Explanation:

All the above are connected to intellectual stuff and hereafter are the right possibilities. One requires to comprehend the definition of intellectual property. In fact, it is a software, a piece of script, art, etc. that a knowledgeable make using his intelligence. All the rights related to such is with the intellect. And that is why the above three choices is right.

The fourth choice has nonentity to do with intellectual stuff, and it deals with the skirmish of interest. And henceforth that is not a correct option.

5 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
Write a program that input a number and display its precessor and successor number using function.
muminat

Answer:

def ask():

x = int(input("Pick a number: "))

p = x - 1

s = x + 1

print("The predecessor is {} and the successor is {}.".format(p, s))

ask()

Explanation:

"def ask():" and everything indented defines the function and "ask" calls the function.

6 0
3 years ago
How dose society use computer in government?​
SCORPION-xisa [38]

Answer:

Like businesses, state and federal government offices use computers. Government employees must set up meetings and distribute various reports. ... Computer uses in government offices also include various e-mail functions, payment distribution, record keeping and even coordinating mailings.

Explanation:

8 0
3 years ago
Where is the os stored on a smartphone?
Digiron [165]

The OS (Operating System) is stored in the ROM on a smartphone. Correct answer: C

ROM stands for Read Only Memory. It is a computer memory that does not require power to store it's data (non-volitile).  It's the Internal Memory where the OS is stored. It is partitioned into two parts, one for the OS and the rest for apps to use.

6 0
3 years ago
Other questions:
  • According to the video, who is the most common employer for Foresters?
    14·2 answers
  • Sort Sorts by value; assign new numbers as the keys.
    14·1 answer
  • You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft, the browser doe
    8·1 answer
  • What do you expect the future trends of an operating system in terms of (a) cost (b) size (c) multitasking (d) portability (e) s
    12·1 answer
  • Is Brainly cheating??
    10·2 answers
  • The internet's data gathways rely on what kind of hardware devies to route data to its destination?
    14·1 answer
  • Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks
    9·1 answer
  • ANSWER QUICKLIY
    5·2 answers
  • Why does 5G mmWave require more cells to achieve a better signal?
    10·1 answer
  • A _____ shows how data moves through an information system but does not show program logic or processing steps.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!