1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
4 years ago
10

Nikki sent flyers in the mail to all houses within the city limits promoting her computer repair service what type of promotion

is this and example of
Computers and Technology
2 answers:
katovenus [111]4 years ago
7 0

Answer:

The answer is <u>direct marketing</u>.

Hope this helps!

Jlenok [28]4 years ago
6 0

Direct marketing (APEX)


You might be interested in
Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received
photoshop1234 [79]

Group of answer choices.

A) the public key had been compromised.

B) the private key had been compromised.

C) the symmetric encryption key had been compromised.

D) the asymmetric encryption key had been compromised.

Answer:

C) the symmetric encryption key had been compromised.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Email encryption is the encryption and authentication of an email to protect the message therein from being read by any person other than the intended recipients. Thus, it protects the email from hacking or invasion by a third party.

Basically, when the message is signed with the sender's private key, the receiver can verify its authenticity using the sender's public key.

Also, encrypting the email message with the receiver's public key provides confidentiality.

In this scenario, the most likely explanation for this result is that the symmetric encryption key had been compromised.

3 0
3 years ago
Which of the following is not a true statement? a. Data flow diagrams and flowcharts are difficult to prepare and revise using s
Nimfa-mama [501]

Answer:

a. Data flow diagrams and flowcharts are difficult to prepare and revise using software packages.

Explanation:

A data flow diagram is a graphical description of the source and destination of data that shows how data flow within an organization.

Documentation tools are used extensively in the systems development process.

Data flow diagrams and flowcharts are the two most frequently used systems development documentation tools. Also, documentation tools save an organization both time and money.

7 0
3 years ago
What tool is included with windows 8 that will help you connect to the directaccess server when you have problems and can be use
Elina [12.6K]
None that I know. Many third party apps.
4 0
4 years ago
__________ is the process by which previously distinct technologies come to share tasks and resources.
andre [41]

Answer:

Media convergence

Explanation:

Media convergence is the process by which previous technologies that were not related merge to becomes more closely integrated so as to share tasks and resources and also advance concurrently.

For instance, television programs, journals, radio programs, and movies, now are available on the web through smart watches, laptops and smartphones.

7 0
4 years ago
Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
victus00 [196]

Answer:

following are the program to the given question:

Program:

x = 0#defining an integer variable that holds a value

if x < 0:#defining if that checks x less than 0

   print("This number ",  x, " is negative.")#print value with the message

else:#defining else block

   if x > 0:#defining if that checks x value greater than 0

       print(x, " is positive")#print value with message

   else:#defining else block

       print(x, " is 0")#print value with message

if x < 0:#defining another if that checks x less than 0

   print("This number ",  x, " is negative.")

elif (x > 0):#defining elif block that check x value greater than 0

   print(x, " is positive")#print value with message

else:#defining else block

   print(x, " is 0")#print value with message

Output:

Please find the attachment file.

Explanation:

In this code, an x variable is defined which holds a value that is "0", in the next step nested conditional statement has used that checks the x variable value and uses the print method that compares the value and prints its value with the message.

In another conditional statement, it uses if that checks x value less than 0 and print value with the negative message.

In the elif block, it checks x value that is greater than 0 and prints the value with the positive message, and in the else block it will print the message that is 0.

3 0
3 years ago
Other questions:
  • Determine whether the relation represents a function. If it is a​ function, state the domain and range.
    6·1 answer
  • What type of mitigation provision is utilized when redundant communications links are installed?
    8·1 answer
  • What can be done in order to secure a WLAN/wireless access point?
    12·1 answer
  • Why were american colonists unhappy with king george iii?
    6·2 answers
  • g Write a program using integers usernum and x as input, and output usernum divided by x four times. For example, if the input i
    14·1 answer
  • Dave wants to host a website and he needs an operating system that is free of cost. Which operating system should he use?
    11·1 answer
  • As discussed in the video, parallax measurements allow us to calculate distances to stars for which parallax is detectable. Supp
    14·1 answer
  • You upgrade your network to 1000 Mbps from 100 Mbps. You install a new 1000-Mbps network adapter into your Windows system. You c
    12·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • The intelligence displayed by humans and other animals is termed?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!