1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
6

What is an advantage of taking notes in a digital format?

Computers and Technology
2 answers:
Paul [167]3 years ago
7 0
The fact that you could easily pull it up

DanielleElmas [232]3 years ago
6 0
No advantage in digital because you brain is not as responsive to digital form than writing with hand   
You might be interested in
Which is an internet service?<br><br> Antivirus<br> Chat<br> Firewall<br> Router
leva [86]

Answer:

Router

Explanation:

The others are not related to internet per se.

8 0
4 years ago
Read 2 more answers
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
NEED HELP
amid [387]

Answer:

i would do B

Explanation:

I YOUNGI

I MIDDLE I

I   AGED  I

I     MEH   I

I_______ I

\ kinda old/

  \ ____ /

   I OLD I

3 0
3 years ago
Grades are numbers or ________ that show how a student performed in a course.
zloy xaker [14]
It’s either letters or percentages
8 0
3 years ago
Read 2 more answers
Can a syntax error occur in a block-based code? Why or why not?
valentina_108 [34]

Answer:

I'm confusd waht u m me ljhnab

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • The common field cricket chirps in direct proportion to the current tem­perature. Adding 40 to the number of times a cricket chi
    14·1 answer
  • My 2 in 1 laptop/tablet
    13·1 answer
  • if image size and resolution are the same, which file format, .jpg, .gif, .or .tiff, will give you the smallest file size?
    8·2 answers
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • When purchasing a mobile computer, you should determine the form factor that meets your needs. What is a form factor?
    15·1 answer
  • Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
    10·1 answer
  • You are in charge of an event at work. You want to plan and schedule events and resourse. What type of software should you use?
    14·2 answers
  • Develop Swimlane Activity diagram for Assignment announcement and submission system.
    6·1 answer
  • If ClassC is derived from ClassB which is derived from ClassA, this would be an example of ________.
    7·1 answer
  • What is contained in the Open Files section of Shared Folders? ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!