1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
8

PLEASE HELP!!!!!!!!!

Computers and Technology
1 answer:
lions [1.4K]3 years ago
8 0
Culturally influenced because in some other countries like italy france paris they all do the cheek kiss thing so it would make sense the way they do it 

You might be interested in
What is the viewing of the physical world with computer-generated layers of information added to it?
vazorg [7]

Answer:

Augmented Reality

Explanation:

<em>Augmented reality</em> enhances the real-world environment through images, sound, and text. Augmented reality is quite different from Virtual reality, because, virtual reality involves the interaction with the computer-generated environment while, Augmented reality models the real-world environment and enhances the results.

Even though it is considered by some as a futuristic technology, MIT Media Lab, particularly the Fluid Interfaces Group in 2009 introduced SixthSense, a device that projects images that can be manipulated using the fingers. Google also introduced the Google Glass in 2013 but pulled back in 2015, it projects images and videos on the user's lens and responds to voice command.

Augmented reality is gradually becoming part of our lives as it is being integrated into mobile devices and equipment.

In conclusion, Augmented Reality gives users the privilege to view the physical world with layers of computer-generated information.

3 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
Why is it pointless to expect cyberattackers to follow organizational legal measures?
WITCHER [35]

Answer:

The answer is A.

5 0
3 years ago
Deborah believes that people of other nationalities are inferior to her. She treats them with disdain and does not miss an oppor
belka [17]
I recommend asking another category, not sure which one but computers and technology is not a good start. Keep looking and good luck!
3 0
3 years ago
What is another term for online data storage?
Aloiza [94]
Cloud storage, meaning storage own by someone else like Google drive
3 0
3 years ago
Other questions:
  • Angela's ready to get started with her first Smart Display campaign, but her account isn't yet eligible due to not having enough
    11·1 answer
  • What is the output of the code snippet given below? string s = "aeiou"; int i = 0; do { system.out.print(s.substring(i, i + 1));
    12·1 answer
  • ________ allows only limited use of media that has been legally purchased.
    11·1 answer
  • Write a complete function called lowestPosition() which takes as array (of double) and the number of elements used in the array
    9·1 answer
  • a password to a certain database consists of digits that cannot be repeated. if the password is known to consist of at least 8 d
    14·1 answer
  • What would be the most efficient way for the chain's
    15·1 answer
  • Design and implement a program (name it Youth) that reads from the user an integer values repressing age (say, age). The program
    6·1 answer
  • What option do you use to view your presentation?
    15·1 answer
  • News writers get story leads from____.
    8·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!