1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
5

Television is a technological development that occurred during the what age?

Computers and Technology
1 answer:
bearhunter [10]3 years ago
5 0

Answer:

industrial age

Explanation:

You might be interested in
How many parameters can we use in each function?
kari74 [83]

Answer:

As many as we need

Explanation:

https://quizizz.com/admin/quiz/5e68ffb7ada381001bd58b3a/codehs-unit-2-lessons-13-to-19

8 0
3 years ago
This is a wise and hard question.....What is the hardest question in the world? I know the answer do you?
SpyIntel [72]
Is it this question? I think the hardest question in the world is the one you just asked! Am I right?
8 0
3 years ago
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
4 years ago
FREE BRAINLIEST!!!
Nastasia [14]

Answer:

B

Explanation:

4 0
3 years ago
Read 2 more answers
How can templates be made available to other users?
Daniel [21]

Answer:

b

Explanation:

4 0
3 years ago
Other questions:
  • Privileged instructions 1) generate an interrupt so they can execute before non-privileged instructions. 2) are valid only when
    5·1 answer
  • The set of appearance choices for files and folders is known as the
    7·1 answer
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • In the processes tab of task manager, the ____ tab displays the âworking setâ of a process, or the amount of memory it is active
    12·1 answer
  • The basic work area of the computer is it screen that you when you first fire up your computer
    6·1 answer
  • B) If you send me an email, then I will finish my program. If you do not send me an email, then I will go to sleep early. Theref
    10·1 answer
  • A 'array palindrome' is an array which, when its elements are reversed, remains the same (i.e., the elements of the array are sa
    6·1 answer
  • Most hand sewing begins and ends with
    5·1 answer
  • Define<br>output<br>devices<br>.<br>Give<br>any<br>three<br>examples<br>.<br>3.​
    8·2 answers
  • A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!