1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
9

If you could own a large technology Company, which one would it be and why

Computers and Technology
1 answer:
Lilit [14]3 years ago
6 0
I would own Apple. Because I would be rich and create apple products
You might be interested in
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
Aleks04 [339]

<u>Some recommend way to prove the authenticity of an email:</u>

  • The coworker as truthful to the company or organization he or she has to check where the same mail is sent long back to the same sender.
  • If search on emails sent item if he sends it will be well and good. Some time backup the mail will be help to proven authenticity of an email.
  • Sometimes once mail is downloaded into ms-outlook or lotus domino some time mail persists in the mail server.
  • He or she can coordinate with the mail server administrator to possible get a log file of sending mail and he can proceed as a record to management.
5 0
4 years ago
If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to
Svetlanka [38]

Answer:

22.5 s is the correct answer to the given question .

Explanation:

Given that

d=7.5km=7.5\times 10^3 m

For light:

We know that speed of light c

c=3\times 10^8 m/s

We know that

Distance = Speed \times timed=C\time tt=\dfrac{D}{t}t=\dfrac{7.5\times 10^3}{3\times 10^8}\ st=2.5\times 10^{-5}st=0.025 ms

For thunder :

Speed of sound ,v=332 m/s

Time\  taken\  by\  sound \\t\’=\dfrac{7500}{332}=22.59 s

Therefore the difference between time is given as follows

\Delta t= t' - \ t=22.59-2.5\times 10^{-5}=22.59 s

22.5 is the answer

4 0
3 years ago
Suppose you are currently in the /home/hnewman/os/fall/2013 directory and would like to navigate to /home/hnewman/discreteStruct
Alex Ar [27]

Answer:

C

Explanation:

ive been doing this same one so its C

6 0
3 years ago
Which of the following statements about the OSI is FALSE?A. The OSI model encourages modular design in networking.B. Each protoc
Afina-wow [57]

Answer:

The correct answer to the following question will be Option B.

Explanation:

<u>Open System interconnection:</u>

  • A practical and conceptual layout that describes network communication that will be used by the systems that are accessible to interconnection as well as other systems, is called the OSI model. This may also be referred to as the OSI model with seven layers.
  • The OSI model aims to direct developers and creators so that they would modularize with the wireless communication devices and computer programs they build, and to promote a consistent structure that defines the features of a network or telecom system.

Therefore, Option B is the right answer.

8 0
3 years ago
Other questions:
  • To calculate the chapter from which you must solve the programming exercise, divide the integer number representing your student
    10·1 answer
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • Select all the items that determine your preference for a concert ticket. a) band that is playing b) date of the concert c) pric
    7·1 answer
  • Which are appropriate uses for special effects in presentations?
    14·1 answer
  • What did Charles Babbage design in 1822 to substitute values in polynomial equations? ENIAC TRADIC Analytical Engine Difference
    6·1 answer
  • The process of combining rows and columns in a table is called _____.
    8·1 answer
  • How do you change the order of the slides in your presentation in the slide pane 
    15·2 answers
  • What are the paparazzi?
    8·1 answer
  • What is a web browser​
    9·1 answer
  • and assuming main memory is initially unloaded, show the page faulting behavior using the following page replacement policies. h
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!