1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
7

Electronic age,what format/equipment people use to communicate with each other?​

Computers and Technology
2 answers:
uranmaximum [27]3 years ago
4 0

Answer:

They share or broadcast information by making a letter or information in a papyrus material. in industrial age they use Telegraph or typewriter to communicate each other.

strojnjashka [21]3 years ago
4 0

In electronic age, people use electronic medium for communication, like emails and messegers.

You might be interested in
Blending two or more colours is called​
krek1111 [17]

Answer:

shading?

Explanation:

Ombré /ˈɒmbreɪ/ (literally "shaded" in French) is the blending of one color hue to another, usually moving tints and shades from light to dark. It has become a popular feature for hair coloring, nail art, and even baking, in addition to its uses in home decorating and graphic design.

3 0
3 years ago
You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho
sdas [7]
The answer is D. line graph
4 0
3 years ago
Read 2 more answers
A computer has dose not have ___________
Ksivusya [100]

Answer:

A computer does not have brain of its own

4 0
3 years ago
Read 2 more answers
which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
WARRIOR [948]

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

5 0
1 year ago
Why won't my laptop charge?
yarga [219]

Answer:

I had a similar problem. I would suggest consulting someone professionally because thats what I had to do. I really dont know why it does that

4 0
3 years ago
Other questions:
  • You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control vari
    14·1 answer
  • MS Excel is a powerful spreadsheet program that helps people with complex mathematical calculations. In what ways could you use
    10·1 answer
  • As defined by the National Institute of Standards and Technology​ (NIST), "________ is a model for enabling​ ubiquitous, conveni
    11·1 answer
  • What is the reasoning you would write an inquiry to a company?
    5·2 answers
  • Grab the stniop or they will dissapear
    12·1 answer
  • Uh can somebody help me
    6·1 answer
  • Which factor affects reading speed the most?
    9·1 answer
  • Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and
    12·1 answer
  • What is the name for data generated by a computer using an algorithm?
    7·1 answer
  • Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!