1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
2 years ago
15

a marketing company is setting up a new office in the city. which type of contract should they sign for periodic maintenance of

their computers and their peripherals
Computers and Technology
1 answer:
True [87]2 years ago
8 0

Answer:

The contract they had to sign was a computer maintenance contract with computer service providers.

Explanation:

<em>Why </em><em>do companies have to </em><em>maintain computers</em><em> regularly? </em>

Because of all the activities of the company at this time on average use applications from computers. With the maintenance of computers, the activities of the company will continue to run well.

There are two types of maintenance that can be carried out:

  • Hardware Maintenance
  • Software Maintenance

#AnswerForTrees

You might be interested in
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
calculate how many turns of cable you will need on the drum for your cage and skip to move up and down by 500 m​
anyanavicka [17]
Physics. only one, if the drum is 500m around... 50 turns. you will need on the drum for your cage and skip to move up and down by 500m. 500/18.84= 26.5.

Mark me as brainliest pls..... :)
5 0
2 years ago
A network that has locations in different countries is considered a WAN.<br> a. Trueb. False
fiasKO [112]

Answer:

True.

Explanation:

Wide area network (WAN) can be defined as a telecommunication network that covers a wide range of geographical locations such as countries or regions across the world for the purpose of communication and sharing information and data between different users.

Hence, a network that has locations in different countries is considered a wide area network (WAN).

Generally, wide area network (WAN) makes it possible for various organizations to interconnect with their branch offices, headquarters and other multiple locations across the globe. Wide area network (WAN) usually span over a distance of 50 kilometers.

6 0
3 years ago
When you need to switch on an electrical current at a remote location, would you use a relay or an amplifier?
ahrayia [7]

Answer:

Relay

Explanation:

They both perform similar functions in terms of control of voltage and current but the relay would be better because although it cannot produce a variable output like that of an amplifier, it has the capacity to isolate its input from its output.

7 0
2 years ago
Write measure five safety measures can be taken to stay safe in social media​
alexdok [17]

Answer:

  1. <u>Use a strong password</u>.
  2. <u>Use a different password for each of your social media accounts</u>.
  3. <u>Set up your security answers. </u>
  4. <u>If you have social media apps on your phone, be sure to password protect your device.</u>
  5. <u>Be selective with friend requests. </u>

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is a key component to your individual internet safety? government regulations
    13·1 answer
  • "Create a Python program named detect_column_level_data_entry_errors. When complete, you will run this program to produce a diag
    11·1 answer
  • This program will read integers from a file and find results from these integers. Open the file, test to make sure the file open
    12·1 answer
  • Run a Monte Carlo simulation on this vector representing the countries of the 8 runners in this race: runners &lt;- c("Jamaica",
    14·1 answer
  • Complete the steps to evaluate the following
    13·2 answers
  • Applications software is also known as
    14·2 answers
  • Whoever answers first gets lots of points
    14·2 answers
  • Does any body know how to bypass easy anti cheat on crossout
    7·1 answer
  • Who benefits from digital technology?
    15·1 answer
  • Which phrase is the best definition of social media?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!