1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
4 years ago
7

The term integration mean?

Computers and Technology
2 answers:
liubo4ka [24]4 years ago
5 0
An act or instance of combining into an integral whole. An act or instance of integrating a racial, religious, or ethnic group. An act or instance of integrating an organization, place of business, school, etc. The operation of finding the integral of a function or equation, especially solving a differential equation.
wariber [46]4 years ago
4 0
Intergration is the process of finding ones self
You might be interested in
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
You have a domain named pearson with two sites named Chicago and Denver. You also have a Windows Server 2016 IPAM server named I
tangare [24]

Answer:

<em>IPAM IP Audit Administrators is the valid solution for this</em>

Explanation:

IPAM in Windows Server 2016 R2 includes a role based access control feature that enables detailed control of the procedures that IPAM users are able to perform. Role based access control adds permissions to the user’s existing access permissions. You cannot deny permission for a user with an access policy. If a user already has permission granted to perform a procedure because they are a member of one or more IPAM administrator groups, they will continue to have that permission even if they have only limited rights granted by role based access polices. If you have deployed IPAM on Windows Server 2016 R2, it is recommended to use the new access control feature available in this version of IPAM.

8 0
3 years ago
A ________ is a connection point that is used to attach peripheral devices to the motherboard.
Alex73 [517]
The point is called "Port".

In a PC there are two kinds of ports usually, internal and external. Both are used to as connection points to connect various devices to PC. Internal port can be used to connect devices such as HDD, CD/DVD ROMs etc while external are used for flash drives, printers and such kind of devices.
3 0
3 years ago
Transistors were invented which year
Korvikt [17]

Answer:

1947

Explanation:

i looked it up

3 0
3 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
3 years ago
Other questions:
  • What is the focus of developers interested in the Internet of things?
    11·2 answers
  • Programming terms!!Please need help!!!
    9·1 answer
  • On the pie chart below, which “slice” represents 30% of the budget?
    8·1 answer
  • Brooke is trying to save enough money in the next fifteen months to purchase a plane ticket to Australia. Every month Brooke sav
    9·1 answer
  • "explain why professional software is not just the programs that are developed for a customer"
    7·1 answer
  • R7.1 Carry out the following tasks with an array:
    7·1 answer
  • What is meant by check digit
    10·1 answer
  • The term "blog" is short for ____.
    14·1 answer
  • 2. Sherry bought the following articles
    7·1 answer
  • B) Develop a truth table for expression AB+ C.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!