1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
12

Uses of internet write in point.​

Computers and Technology
1 answer:
Vladimir [108]3 years ago
3 0

Answer:

-Electronic mail. At least 85% of the inhabitants of cyberspace send and receive e-mail. ...

-Research.

-Downloading files.

-Discussion groups. ...

-Interactive games. ...

-Education and self-improvement. ...

-Friendship and dating. ...

-Electronic newspapers and magazines.

You might be interested in
In g.o.o.g.l.e sheet Columns are labeled by ____​
telo118 [61]

Answer:

Explanation:

Click the Data option.

Click on Named Range. This will open the 'Named ranges' pane on the right.

Click on the 'Add a range' option.

Enter the name you want to give the column (“Sales” in this example)

Make sure the column range is correct. ...

Click on Done.

3 0
2 years ago
What process does a system use to officially permit access to a file or a program CIS 502 ?
ipn [44]

Answer:

Authorization                                

Explanation:

Authorization is a security process to determine access levels related to system resources such as files, services, computer programs, data and application features. This is the method of allowing or denying access to a resource which enables the user to get access to various services and resources depending on the user's identity.

Authorization is the process that checks if a user has the permission to get access to a particular file or perform a particular action, ensuring that user has successfully authenticated himself. It refers to defining access policy.

For example a system administrator determines for the system device, in multi-user computer systems, which users are granted access to system and its resources and privileges are granted.

4 0
3 years ago
If you are the Head of H.R Department in Ali Manufacture Company and you have hire the totally fresh candidates in your company
cluponka [151]

Answer:

on the job training

Explanation:

I would personally suggest on the job training. This is because it provides the new candidates specific experience on how the job will be on a day-to-day basis. This can drastically increase the performance of hired candidates since they will know exactly what and how to perform for that exact company. Also, it will help the candidates get acquainted with the other current employees and even get rid of candidates who would have eventually quit by showing them exactly what the job will be like. Some candidates will realize that the job is not right for them and simply give up and quit.

7 0
3 years ago
What is the fundamental difference between a fat-client and a thin-client approach to client server systems architectures?
AlekseyPX

Client server architecture

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

<em>Examples </em>

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

The clients interact with the server through the internet.

Clients can be either thin client or thick (fat) client.

<em>The differences in them are described below. </em>

1. Thin client, as per the name, performs minimal processing. Thick or fat client has the computational ability necessary for the client.

2. The thin client possesses basic software and peripherals and solely relies on the sever for its functionalities. Fat client has the resources needed to do the processing.

3. The user interface provided by the thin client is simpler and not rich in multimedia. The user interface provided by the fat client is much better and advanced.

4. Thin client relies heavily on the server. Fat client has low dependency on the server.

5. In the thin client set up, servers are present in more number. In this set up, servers are present in less number.

6. Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

3 0
4 years ago
A technician needs to configure wireless Internet access in an open warehouse environment. After installing the equipment, the t
ValentinkaMS [17]

Answer:

Change the antenna placement.

Explanation:

At times, varying signal strengths can be as a result of wrong antenna position. However, this can be addressed by changing the position of the antenna.

4 0
4 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • Can Any body Define what is search engine in a simple language quick please​
    14·1 answer
  • Question 2 Unsaved Which of these is NOT an example of an emerging technology? Question 2 options: Sixth Sense Close Range Drone
    6·1 answer
  • To “synthesize” means to combine information to create new information.<br> YES or NO
    10·2 answers
  • Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array.
    6·1 answer
  • Do you agree that technology can be used to commit acts of violence ? Explain why or why not
    11·1 answer
  • 3n - 12 = 5n - 2<br> how many solutions?
    15·1 answer
  • You are hired as an IT consultant for the government owned mobile operating company, Teletalk. Based on the following scenario,
    8·1 answer
  • Can someone be my friend,don't friend me until i ask you Questions
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!