1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
14

I really need help with this question

Computers and Technology
1 answer:
zhuklara [117]3 years ago
3 0

teleconferencing is like zoom or skype you can be in a call with facetime.

You might be interested in
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
If no help file is available for a particular dialog box, then, when you press the F1 key, the ____ opens.
nadya68 [22]

B. main Help window. Try pressing F1 in google chrome. A google support link will show up.

6 0
3 years ago
You are a network administrator responsible for all network platforms and services. The company wishes to use a hosted service t
Otrada [13]

Answer:

The network management requirements before the srvice is provided are as follows:

NMS policies need to be followed that would define what all data's to be collected and in what way.So as to monitor and manage the network,regular network discovery should be made and scanning should be made in order to identify the network connected devices.End of life policy to be followed with track maintanance aggreements.Network Change and Configuration Management configuration changes are to be made.Interface statistics is to be followed and made.Spanning tree protocol changes,router redundancy protocol and broadcase storm detection protocols need to be implemented.

5 0
3 years ago
You install an M.2 SSD card in an M.2 slot on a motherboard. When you boot up your system, you discover the DVD drive no longer
asambeis [7]

Answer:

a. The DVD drive SATA connector is disabled.

b. The DVD drive cable is loose or disconnected.                                                                                  

Explanation:          

When using an M.2 SSD card in M.2 slot on the motherboard, SATA ports are disabled. This is because sometimes these ports break out of their connection or link. So check SATA connectors and check if the SATA cables are connected to the SATA port properly. Also sometimes that DVD drive does not show up when you boot your system after installing m.2 SSD card because of the loose or disconnected cable. This cable can be unknowingly unplugged so all the cable connections must be checked in order to resolve this issue.

3 0
3 years ago
Creating a Resume
Olin [163]

Answer:

Please check attachment. And you can choose any template. Always remember keyword however,

Explanation:

You need to keep in mind that keyword is important for surfing. Hence,  while doing the research, we need to find the keyword first, and then select the template. Choose the template which is clear and simple.

Your search will be like

DB ARCHITECT TEMPLATES etc.

Rest part is self explanatory,

Download docx
4 0
3 years ago
Other questions:
  • The process of __________ encourages members to accept responsibility for the outcomes of a group and for changing the style in
    8·1 answer
  • software that instructs the computer how to run applications and controls the display/keyboard is known as the what?
    8·1 answer
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • Write the equivalent c++ expression for the following algebraic expressions
    11·1 answer
  • What are reserved words in C programming?
    9·1 answer
  • 6.3 code practice: Question Edhesive
    8·1 answer
  • Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
    5·1 answer
  • A file named "dogs.txt" exists and has 60 lines of data. You open the file with the following line of code.
    5·1 answer
  • How you move the selection to a specific range by its name
    14·1 answer
  • Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understoo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!