1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
8

Our ways of communicating in society will change mostly due to: O A. our desire to be isolated. O B. a population decline. O O C

. changes in technology O D. alterations in our brains.​
Computers and Technology
1 answer:
GalinKa [24]3 years ago
4 0

Answer:C

Explanation:

You might be interested in
Write down the stages in the information prcessing cycle in correct order​
Naddika [18.5K]

Answer:

The answer is below

Explanation:

The various stages in the information processing cycle in the correct order​ is as follows:

1. Input stage: this is when the data is sent into the computer through the hardware

2. Processing stage: this when the is being refined in the central processing unit of the computer

3. Storage stage: this is when the data is being saved or stored in the computer memory such as Hard drive or external storage such as Flash drive

4. Output stage: this is when the refined or processed data is produced to the user either through the monitor screen or printing

4 0
3 years ago
Which of the following can you use to attach external hardware devices to a computer?
Genrish500 [490]

The answer is c that what a lot of people use☻

5 0
2 years ago
Read 2 more answers
Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re
Neporo4naja [7]

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

5 0
3 years ago
You received a call form a user who brought her own device to the office but cannot find or connect to the company WLAN. The lap
lapo4ka [179]

Answer:

Company WAP has SSID broadcast disable

Explanation:

Disabling SSID broadcast will make your WLAN network name invisible to other users. However, this only hides the name, not the network itself. that's why the user cannot find the company WLAN on her computer but yet can connected to the company WLAN and can browse to multiple websites with no problem from their company-assigned laptops.

8 0
3 years ago
Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)? Group of a
VladimirAG [237]

Answer:

168.16.1.1 is correct.

Explanation:

168.16.1.1 is the legitimate Internet Protocol address that can be used on the Internet.

Internet Protocol 10.10.1.1 and internet Protocol 172.30.1.1 are the private internet protocol addresses so they could not be used on the internet.

The Internet Protocol 234.1.1.1 has been used as a multicast address so they may not be used on the Internet.

7 0
3 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • For some people , alcohol can cause an uncontrollable blank of the eyes , making good vision almost impossible
    5·1 answer
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our s
    6·1 answer
  • What does “int” means in php code
    13·1 answer
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • (This is for photography segment exam btw)
    11·2 answers
  • Which of the following parameters is optional sample(a,b,c,d=7
    9·1 answer
  • Determine the value of a and b at the end of the following code segment:
    12·1 answer
  • A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the bett
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!