1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
15

What is the promotion and advertising stage of a product or service called?

Computers and Technology
1 answer:
Eddi Din [679]3 years ago
8 0

Answer:

Marketing

Explanation:

You might be interested in
Write a short reflection piece (it may consist of three bulleted items, with one explanatory sentence) on three things you learn
nydimaria [60]

Answers

  • OS(The Operating System) sends <em>interrupts to the processor</em> to stop whatever is being processing at that moment and computer architecture send <em>data bus</em>. This bus sends<u> data between the processor,the memory and the input/output unit.</u>
  • The operating system is a low-level software that supports a <em>computer’s basic functions</em>, such as <u>scheduling tasks and controlling peripherals</u> while the computer architecture has the <em>address bus bar</em>. This bus carries <u>signals related to addresses between the processor and the memory. </u>
  • The interface between <em>a computer’s hardware and its software</em> is its Architecture while An operating system (OS) is<u> system software that manages computer hardware and software resources and provides common services for computer programs.</u>

Explanation:

In short explanation,the Computer Architecture specifically <em>deals with whatever that's going on in the hardware part of the computer system </em>while the Operating System is the computer program <em>which has been program to execute at some instances depending on the programming instructions embedded in it</em>. An example is the MS Office.

5 0
3 years ago
Whenever you are designing a project for commercial use (making money) and need to use photographs with people in them you must
Leya [2.2K]

Answer:

Copyright

Explanation:

7 0
3 years ago
Anyone know how to fix this
gizmo_the_mogwai [7]

Put the mouse at the top of the black part and click and hold down, and then drag it down to the bottom. And don't feel embarrassed to ask somebody lol

3 0
3 years ago
GDP measures the production levels of
UkoKoshka [18]

Answer:

A. Standard of Living

Explanation:

Gross Domestic Products (GDP) is a measure of the total market value of all finished goods and services made within a country during a specific period.

Simply stated, GDP is a measure of the total income of all individuals in an economy and the total expenses incurred on the economy's output of goods and services in a particular country. Also, Gross Domestic Products (GDP) is a measure of the production levels of any nation.

Basically, the four (4) major expenditure categories of GDP are consumption (C), investment (I), government purchases (G), and net exports (N).

Hence, the standard of living of the people living in a particular country automatically improves if a nation's level of productivity or production improves; they are able to easily pay for goods and services, as well as save and invest their money.

In contrast, inflation and high unemployment rate are indications of economic downturn, recession and low level of productivity (output) in a country; this would automatically affect the standard of living within such countries.

4 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
Other questions:
  • A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.
    13·1 answer
  • A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
    11·1 answer
  • Describe one example of how technology assits people with data and sample collection
    14·2 answers
  • What is a set of javascript statements that result in an action?
    15·1 answer
  • What are the data types in access​
    6·1 answer
  • Which of the following might an interior designer in the retail industry specialize in?
    9·1 answer
  • HOW TO FREE UP RAM/MEMORY ON YOUR DEVICE?
    12·2 answers
  • All computer systems have
    14·2 answers
  • Which solution eliminates the need for dedicated high-speed WAN connections between sites
    5·1 answer
  • What free website can you record videos on, and edit them without money?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!