1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
5

Plsss help me1)give 2 examples of systems that you use or see in your day-to-day life​

Computers and Technology
1 answer:
Gnoma [55]3 years ago
5 0

Answer:

The modern world has numerous kinds of systems that influence daily life. Some examples include transport systems; solar systems; telephone systems; the Dewey Decimal System; weapons systems; ecological systems; space systems; etc.

You might be interested in
In which state of matter is there no particle motion?
kiruha [24]
Solid is your answer for the day
6 0
3 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
meriva

Answer:

The reason we are more honest online is simpler than we think, says Hancock. In the past, before there was modern technology or even written language, people could lie to each other easily. Once the words were said, they disappeared. ... Technology therefore might make us more honest than ever

6 0
3 years ago
Read 2 more answers
Your worksheet contains confidential information in column C; to prevent others who use your worksheet from seeing the data, you
emmainna [20.7K]
To prevent others who use your worksheet from seeing the data you can hide column C
5 0
2 years ago
5. Lael is always on the lookout for students who might be interested in running for office in student groups. In cell M2, enter
drek231 [11]

Solution :

It is given that Lael always looks out for the students who are interested in running for the office in a student group.

We use an excel sheet to determine whether a student had already elected to the office of the student group or not.

The formula used for the excel sheet used is :

$=IF(EXACT(K3,"Yes")."ELECTED", "Yes",IF(K3,'Yes),"Yes","No"))$

                K                        L                             M                    N          

   Elected group    Finance certificate            

          Yes                    Yes                              Yes

          No                     Yes                               Yes

          No                      No                                No

6 0
3 years ago
Other questions:
  • Why is peer answer always not working? just wondering idk why
    7·2 answers
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • ________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
    14·1 answer
  • DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
    6·1 answer
  • Read the argument below and determine the underlying principle that was used to come to the conclusion presented: It is recommen
    5·1 answer
  • List any two different between primary memory and secondary memory.​
    8·2 answers
  • 152<br>what is the role of Computer as<br>transforming agent in the<br>Information society.​
    14·1 answer
  • 12.2 Sort an array in ascending order Write a program that gets a list of integers from input, and outputs the integers in ascen
    10·1 answer
  • Susan wants to play the games that come with Windows on her computer, but they are not on the Start menu. What should she do in
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!