1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
10

¿Como viaja la información? en la tecnologia

Computers and Technology
2 answers:
Anna007 [38]3 years ago
7 0
Se podría decir que la información viaja después de ser compartida por los usuarios, por ejemplo cuando algo se hace viral ese video o cosa puede llegar hasta otra nación simplemente por el hecho de aver sido compartida por muchos usuarios.
Simora [160]3 years ago
6 0

Answer:

Todavía estoy aprendiendo español, por lo que las palabras podrían estar mal de alguna manera.

Explanation:

El seguimiento de vuelos, las agencias de viajes en línea y el uso de las redes sociales en línea son todas formas de tecnología de viajes que pueden ayudar a las personas a planificar viajes. La tecnología de viajes incluye sistemas de reserva por computadora, así como aplicaciones mucho más amplias que son cada vez más importantes.

You might be interested in
Which attack intercepts communications between a web browser and the underlying computer?
Vlad [161]

The question has the below multiple choices

A. Man-In-The-Middle (MITM)
B. Man-In-The-Browser (MITB)
C. Replay
D. ARP poisoning

The answer is B

As compared to the Man-In-The-Middle attack, the Man-In-The-Browser attack intercepts communications between parties to manipulate or steal data. This attack seeks to intercept and steal or manipulate communication that exists between the browser and the underlying computer. It begins with a Trojan infecting the underlying computer and installing an extension into the web browser configuration.







6 0
3 years ago
Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con
Zina [86]

Answer:

The answer is: antispyware.

Explanation:

Let me translate your question first:

Software that searches for, detects, and removes spyware-type malware; it can be installed on the computer in isolation or in conjunction with a security package.

And the answer to your question is anti-spyware. An anti-spyware is a program that protects your computer from any type of spyware malware which tries to get private information from you and disturb your privacy. There are many different anti-spyware programs, some of which include Windows Defender, Spybot - Search and Destroy, and many others.

5 0
3 years ago
You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
Kazeer [188]
False you have to move your fingers
3 0
2 years ago
Should organizations fear websites where consumers post negative messages about products or services? What actions can companies
pickupchik [31]

Answer:

This is something that actually helps organizations to improve their work and subsidiaries by people's real time assessement.

Explanation:

When consumers post negative messages, whether they are true or not, organizations have the opportunity to have an online conversation with consumers and provide help in real time communication. This improves communication within a company and with other subsidiaries by evaluating honest and threatening comments related to e-commerce real life development. There are a lot of people who do not use products according to the comments available on their marketing webpages, such as myself. These are all important for everyone to assess if it is worth to buy a product or not, and to keep up an online community in which people help each other by suggestions and recommendations, and organizations can take a lot of advantages from that, such as increasing their number of consumers.

5 0
3 years ago
Your job is to choose a data structure to implement polynomials whose coefficients are positive integers, such as 17x^4+4x^3+0x^
tatuchka [14]

Answer:

3

Explanation:

8 0
3 years ago
Other questions:
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • Write a Python program to do the following: (a)Use a for loop and a random integer generator to generate 5 random integers in 1
    10·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • If you want to present slides to fellow students or coworkers which productivity software should you use to create them A. Word
    14·2 answers
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • Ann needs to share information about a new hiring policy. She needs to communicate this information to more than one hundred emp
    15·2 answers
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • Part 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will
    5·1 answer
  • What are the words that make up a high-level programming language called?
    6·1 answer
  • Prior to the 1996 NEC, ____ receptacles and cords were permitted. However, now it is mandatory that a separate equipment groundi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!