1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
3 years ago
9

Teniendo en cuenta la realidad mundial acerca de la pandemia, ¿cómo crees que impacta

Computers and Technology
1 answer:
KatRina [158]3 years ago
5 0

Answer:

1.)death 2.)mow the lawn 3.)landscaping telemarketing teach.

FOR SPAINISH

1.) muerte 2.) cortar el césped 3.) paisajismo telemarketing enseñar.

You might be interested in
In terms of CPU scheduling metrics, __________ is the time at which the job completes minus the time at which the job arrived in
Evgesh-ka [11]

Answer:

b. turnaround time

Explanation:

A scheduling computer system refers to the ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

In terms of CPU scheduling metrics, turnaround time is the time at which the job completes minus the time at which the job arrived in the system. It is one of the scheduling metrics to select for optimum performance.

7 0
3 years ago
Explain the difference between social engineering and reverse social engineering.
san4es73 [151]
Social Engineering is the art of eliciting sensitive information from people by tricking them. Like through phishing, fake emails that contain a virus and fake programs. They get your password or any other sensitive information by making you think the website/program is legit. That's why you should always make sure the new website/program you visited is safe.

Reverse Social Engineering is, on the other hand, where the initial attacker becomes attacked. Or the victim redirects the attacker to someone who can counter the attacker. E.g attackers call the front desk and ask for information X. Instead or giving him information X, front desk redirects the call to the security department. An example is where the attacker is fed false information. Law enforcement agencies often perform this attack.
5 0
3 years ago
Rachel works in a bank. She wants to present the idea of implementing an IS to the management. How should Rachel describe the IS
Leni [432]

Rachael should describe information system to the management as an organized system that helps collect or gather, organize, track, store, manipulate, and analyze data to generate and distribute the information from gathered data to appropriate persons. The information generated is useful for managing your operations and making decisions. The efficient use of Information Systems will, without a doubt give a lot of opportunities to the company.

6 0
3 years ago
Read 2 more answers
If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is ca
Luda [366]

Answer:

Software as a Service (SaaS)

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service. Therefore, if you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a Software as a Service (SaaS) application.

Some examples of SaaS applications are Salesforce, Google apps, Bigcommerce, Dropbox, Slack etc.

8 0
3 years ago
What type of game is LEAST LIKELY to need a structured narrative?
VladimirAG [237]

Answer:

Probably a sports game

Explanation:

A role-playing means acting it out, so you need to explain the life with a structured narrative.

An adventure game needs lots of background, so you need to fill that in with a structured narrative.

A sports game revolves solely around sports, so you only need to know how to play the game and/or sport, so no structured narrative is needed.

An fps game needs a structured narrative in that it is similar to an adventure game and needs background.

Let me know if I was right! Hope this helped. :)

5 0
3 years ago
Other questions:
  • What does the Sort feature do with a database
    13·1 answer
  • The utilization of a subset of the performance equation as a performance metric is a pitfall. To illustrate this, assume the fol
    13·1 answer
  • What is secondary exchange ? - Apex
    14·1 answer
  • A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
    14·1 answer
  • State the difference between = and ==
    9·1 answer
  • Where do you define parameter variables?
    14·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • Help plz, u just gotta select all that apply :)
    15·1 answer
  • What is a functional organisation? and how it functions​?
    12·1 answer
  • Fiona was talking to her colleagues about how advancements in digital technology had a negative effect on her life. Which aspect
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!