1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
3 years ago
15

Why would we want computer to need data automatically into a computer system for us?

Computers and Technology
1 answer:
victus00 [196]3 years ago
5 0

So we can keep track of it


You might be interested in
You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a d
coldgirl [10]

You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a disaster recovery (DR) plan that will protect against the loss of critical data. The DR site must be at least 500 miles from your primary site and data transfer between the two sites must not traverse the public internet. The recommended disaster recovery plan is

<u>A. Create a new virtual cloud network (VCN) in the Phoenix region and create a subnet in one availability domain (AD) that is not currently being used by your production systems. Establish VCN peering between the production and DRsites.</u>

<u></u>

Explanation:

  • Local VCN peering is the process of connecting two VCNs in the same region and tenancy so that their resources can communicate using private IP addresses without routing the traffic over the internet or through your on-premises network.
  • You have a central VCN that has resources that you want to share with other VCNs.
  • A VCN is a customizable private network in Oracle Cloud Infrastructure. Just like a traditional data center network, a VCN provides you with complete control over your network environment.
  • A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP network into multiple, smaller network segments.
  • A VCN resides in a single Oracle Cloud Infrastructure region and covers a single, contiguous IPv4 CIDR block of your choice.

4 0
3 years ago
Can someone help me on how to start this essay?
mezya [45]

Answer:

Start off with an interesting introduction (add questions) make it interesting.

6 0
3 years ago
Read 2 more answers
Which of the following is an object-oriented programming language?
Svetradugi [14.3K]

Explanation:

This is the correct answer

<h3>python</h3>
7 0
2 years ago
Which guideline should you use when downloading software from the internet?
Anton [14]
Limiting your computer's vulnerability to malware is a crucial safe browsing habit. You can protect your computer by running antivirus<span> and </span>antimalware<span> software like </span>Bitdefender<span>, </span>Norton<span>, or </span>Kaspersky<span>. These programs can block malware from being installed and can remove it if it does get onto your computer. Even if you don't see signs of malware on your computer, running regular scans can catch any malware that has escaped notice.</span>
4 0
3 years ago
Read 2 more answers
Globalization is the trend A) of the world economy becoming a less dependent system. B) of the world economy toward becoming a m
mojhsa [17]

Answer:

B) of the world economy toward becoming a more interdependent system.

Explanation:

Globalization refers to the process of international trade which brings people, companies together for the sole aim of exchanging goods, services, capital, knowledge across international borders.

This process of interaction makes people to get closer and increase international cooperation.

4 0
3 years ago
Other questions:
  • You can drag a cell to a new location by pointing to the cell border until the pointer displays a _______ arrow, and then draggi
    9·2 answers
  • In object-oriented analysis, objects possess characteristics called _____.â
    14·1 answer
  • Determine whether the relation represents a function. If it is a​ function, state the domain and range.
    6·1 answer
  • When computer manufacturers overcame the enormous 13,000 Chinese character barrier by creating a workable keyboard through voice
    15·1 answer
  • A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ___
    14·1 answer
  • An inserted graphic in Excel is
    12·2 answers
  • How do I do this? I know the shapes and everything but how do I do b, d, and e?
    7·1 answer
  • A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the admi
    7·1 answer
  • Give five examples of physical networking.
    15·1 answer
  • What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!