1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
12

Differentiate between inherited trait and acquired trait​

Computers and Technology
1 answer:
miskamm [114]3 years ago
8 0

Answer: Inherited trait is something you already have and acquired is something that you learn or achieve.

Explanation:

You might be interested in
Why is monitoring email, voice mail, and computer files considered legal?
Sati [7]

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
6 0
3 years ago
What is the role of a Chief Information Officier in anorganization?
vladimir1956 [14]

Answer and Explanation:

There are several roles of a Chief Information Officer in any organization and these are as follows:

  • He must fulfill his responsibility as a business leader.
  • He must be able to make executive decisions regarding sales and purchase related matters.
  • He must be able to deal with all the Information Technology related problems.
  • He must be able to recruit the best candidates in the best interest of the organization.
  • He is required to map out the ICT policy(includes procurement, external and internal standards of an organization, future proofing) and ICT strategy.
  • He must be able to write up ICT policy  with detail of its utilization and application.
  • He must possess organizational skills

8 0
3 years ago
What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
TEA [102]
D because at the same time it might be long


4 0
3 years ago
Read 2 more answers
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
Write the difference between:
JulsSmile [24]

Answer:

RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file

3 0
4 years ago
Read 2 more answers
Other questions:
  • Write a program to output the following quote by Edsger W. Dijkstra: "Computer Science is no more about computers than astronomy
    9·2 answers
  • The best way to insert an existing Excel chart into a document is to
    12·2 answers
  • What happens when a filter is applied to a database?
    13·1 answer
  • Word, by default, places a tab stop at every ____ mark on the ruler.
    6·1 answer
  • Best free vpn to bypass geo tagging
    5·1 answer
  • Color ___ indicates that one color is dominating a picture.
    7·1 answer
  • You are creating a mobile version of a community discussion site for busy moms. Users post questions and other topics for discus
    10·1 answer
  • What is a graph,a chart then give similarities between graph and chart.​
    6·2 answers
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
  • A device that turns hard copy, such as a paper document, into a digital format that can be viewed or manipulated on a computer i
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!