1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
7

When you must give something up in order to get something else it's called

Computers and Technology
1 answer:
matrenka [14]3 years ago
8 0

Answer:

Opportunity cost refers to what you have to give up to buy what you want in terms of other goods or services. When economists use the word “cost,” we usually mean opportunity cost.

Explanation:

please give me a heart

You might be interested in
An organization is concerned with the amount of sensor data that is being generated locally, analyzed in the cloud, and returned
Sonja [21]

Answer:

Fog computing

Explanation:

Fog computing or fogging is an decentralized architecture that resides between the cloud and the data source. Fog brings the cloud closer to the data source, that is, it brings resource exploitation, security polices and operational cost closer to the data source.

In our scenario, with fogging in place, the generated sensor data will be preprocessed closer to the local site. The data will preprocessed faster and the quality of the processed data will be greatly increased.

3 0
3 years ago
How do airbags prevent injury?
NARA [144]

honestly i think ur answer would be D because it keeps you from flying out of the window

8 0
3 years ago
You received a call form a user who brought her own device to the office but cannot find or connect to the company WLAN. The lap
lapo4ka [179]

Answer:

Company WAP has SSID broadcast disable

Explanation:

Disabling SSID broadcast will make your WLAN network name invisible to other users. However, this only hides the name, not the network itself. that's why the user cannot find the company WLAN on her computer but yet can connected to the company WLAN and can browse to multiple websites with no problem from their company-assigned laptops.

8 0
3 years ago
IS ANYONE ELSE JUST GETTING PPL PUTTING LINKS WHEN U ASK A QUESTION???
TiliK225 [7]
UGH IKR, LIKE JUST ANSWER THE FRICKIN QUESTION
4 0
2 years ago
Read 2 more answers
Is Conflict Healthy ?<br>​
Vesna [10]

yes

Explanation:

because it has more things

6 0
2 years ago
Read 2 more answers
Other questions:
  • What uses HTML hypertext links that users can click to access different locations or information?
    11·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • Read an integer from keyboard and then print the result of the sum obtained by adding the entered integer to the integer formed
    11·1 answer
  • Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
    15·1 answer
  • Is there a way to get back old messages that you didn't mean to delete??? I have a Samsung S5 and I really really need help. I d
    11·2 answers
  • According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-gra
    11·1 answer
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • Develop a C program that calculates the final score and the average score for a student from his/her (1)class participation, (2)
    9·1 answer
  • Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (l
    15·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!