1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
drek231 [11]
3 years ago
15

¿Hablar de datos o Internet es lo mismo o no? justifique su respuesta​

Computers and Technology
1 answer:
Tasya [4]3 years ago
4 0

Answer:

no,por qué si hablas de datos puedes tener internet o red en cualquier lugar que vallas o estés , mientras que internet solo puedes usarlo mientras estés en el lugar donde se encuentra el módem.

You might be interested in
4. When you're working with a word processing document and you press the Del key, what happens?
Thepotemich [5.8K]
When you're working with a word processing document and you press the Del key, C. The entire document is deleted.

I have actually tried doing this to know which choice is the correct answer. I opened a new document, typed some words then pressed the Del key.... NOTHING HAPPENED! The character to the right of the cursor was not deleted, the entire document was not deleted, nor was the formatting style deleted.

I chose letter C because after seeing that nothing happened in an open document, I saved said document and opened the folder where the document was saved. I selected the document and pressed the Del key... a prompt appeared asking me if I was sure that I want to move my file to the Recycle Bin? I clicked yes... the entire document is deleted

7 0
4 years ago
Read 2 more answers
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
Zach wants to learn a programming language to create games and applications. this programming language will also create web appl
Mkey [24]

Answer:

JavaScript is a good option

6 0
3 years ago
Read 2 more answers
Every application program has a _______________ segment
Natali5045456 [20]
"Main" goes in the blank. For example in C++ all of your code goes in the main function.
4 0
3 years ago
Factors to consider while selecting a software to use​
luda_lava [24]
You need to consider what exactly you will be using the software for, there are many different softwares and they all have different purposes.
6 0
3 years ago
Other questions:
  • How can i add card reader to pc answers?
    9·1 answer
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • Alex leads a team of eight members. Arrange his tasks in sequential order of phases of group dynamics. What are the stages in gr
    13·1 answer
  • Websites that are designed to adapt gracefully to any screen size use a technique called
    5·1 answer
  • Correspondence involves verbal communication. True False
    6·2 answers
  • Once you select select a crop boundary, you can no
    15·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • Edhesive 3.4 practice 1
    9·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • Which type of GUI control would be best to use if you wanted the user to select one date from a list of three possible dates to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!