1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
10

Which action is a result of human error?

Computers and Technology
1 answer:
djyliett [7]3 years ago
4 0
The answer is Outsourcing data hope this help if yes leave a thanks
You might be interested in
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
What technology made it possible for computers to become small enough to fit on a person's desk (and later in a pocket)?
ira [324]

Answer: Silicon chips

Explanation:

Silicon chips are the integrated circuit(IC) devices that are used in computing systems and devices for processing.They are made with silicon as the main element as it is available in abundant amount at low cost. It has the property of conduction as well insulation accordingly.

  • Gathering several silicon chips togather to make a unit of processor is the prime function.It is the component that is tending to make the computing system to size down generation by generation.
  • Transistors are made for the devices that contain the silicon chips.If the size of transistor is decreased or the number of chips placed in transistor is decreased then the size of device also decreases.This is the major factor due to which size of technology is decreasing with the same processing.
8 0
3 years ago
Why are new versions of applications packages released often ​
stellarik [79]

Answer:

The answer is "new version of application provides more easy to use".

Explanation:

  • In computer science, an application is a program, that is installed on the computer. There are many types of application software, that are "gaming software, working software, programming software, etc." At the end of time users want some new things in software to know users need programmer developed new versions of the software.
  • The update usually improves the device or service in its current version, whilst an improvement is an entirely new version. Installation is usually free and easy. You also have to wait for updates that are difficult to install.
5 0
3 years ago
How to check if students viewed an assignment canvas.
Greeley [361]
Which app are you using?
6 0
2 years ago
What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today??
antiseptic1488 [7]


The four primary factors that set the stage for web 2.0 of the social web are following:  broad bandwidth, sustainable business models, new web programming technologies and application programming interfaces.
• Broad Bandwidth which technology developments have been taking place at a faster situation and the availability of internet has remarkably increased over the years through the rise of broad band technology. The broadband increase in easy accessibility laid a strong base for social web or web 2.0.

• Sustainable Business Model which E-commerce took its roots and has proven a great success rate.

• New Web Programming Technologies which includes web content, web client, server scripting and network security.

• Application Programming Interface is a system of resources and tools in an operating system which enables the developers to create software applications.
7 0
4 years ago
Other questions:
  • An outdoor products company wants to test a new website design where customers can get information about their favorite outdoor
    6·1 answer
  • En cual programa puedo hacer un mapa mental
    15·1 answer
  • Why is it important to open the Map Custom Fields dialog box before importing/exporting a list of contacts? Check all that apply
    6·2 answers
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • Which of the following sections of a business plan comes first but should be written last?
    11·2 answers
  • In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the
    11·1 answer
  • What Temperature does mainframe need
    15·2 answers
  • What are the advantages of using a folder?​
    6·1 answer
  • When declaring the data type for a multidimensional array of strings, which statement would be most appropriate?
    15·1 answer
  • Label some of the main service provided by the internet.using the picture​.. please...
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!