1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dolphi86 [110]
2 years ago
7

Ann wants to download Adobe Acrobat software from the Internet. Prior to downloading, a standardized online contract appears on

the screen that requires her to click on an icon indicating agreement, before she can proceed in the program. Such contracts are called:
Computers and Technology
1 answer:
IceJOKER [234]2 years ago
5 0
Answer: terms and services
You might be interested in
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
3 years ago
Identify and discuss the seven layers of the Open System Interconnection (OSI) model and their importance on TCP/IP operation.
a_sh-v [17]

Answer:

following are the OSI Layers

1.physical layer

2.datalink layer

3.network layer

4.transport layer

5.session layer

6.presentation layer

7.application layer

Explanation:

physical layer is used to transmit media,signal and binary information

datalink layer is used for physical addressing MAC and LLC

network layer is used for path determination and ip

transport layer is for end to end communication and reliability

session layer is for interhost communication

presentation layer is for data representation and encryption

application layer is network process to application

4 0
3 years ago
Jump to Question: Fill in the blanks below: The flow of electricty is similar to the movement of water through a pipe. The movem
HACTEHA [7]

The answer is;

Current  

Voltage  

Power/Wattage  

Circuit

Water moving through pipes is like electricity flowing in a circuit. The flow of electricity is an actual flow of electrons. That movement of electrons is what is known as current. Think of current as the volume of water flowing through a water pipe. The electrons need some force or pressure to move, and so is water in a pipe. The voltage is that electromotive force; the pressure that pushes the electrons in a system. The power measured in Watts is the rate at which the energy is consumed. For the current to flow the circuit must be complete. Otherwise we cannot say that we have power if the circuit is not closed.

5 0
3 years ago
You need to prevent the use of tftp through your firewall. which port would you block?
xz_007 [3.2K]
Hello <span>Huber5598 </span>


Question: <span>You need to prevent the use of tftp through your firewall. which port would you block?
</span><span>
Answer: You should block UDP port 69 to block TFTP


I Hope This Helps You :-)
-Chris</span>
4 0
2 years ago
Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
Alinara [238K]

A. use split worksheet view to break the worksheet into different visible sections

<u>Explanation:</u>

Jason is working on a project that requires him to manage a huge amount of data. There are numerous instances when a user has to manage a huge amount of data within a single spreadsheet. It will cause trouble for the user to simultaneously access the data from more than one table in the same sheet.

To deal with this problem, Jason can track and compare this data as he works on the spreadsheet by using the split worksheet view to break the worksheet into different visible sections. The different sections provide a better view of the tables and data extraction and manipulation become easy.

6 0
3 years ago
Other questions:
  • In what ways are Outlook notes useful for personal or professional use? Check all that apply.
    13·2 answers
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • A server, also called a(n) _______________, operating system is a multiuser operating system because it controls a central compu
    6·1 answer
  • Oiê gentee, bom dia O que você entende por cultura digital ??
    12·1 answer
  • The World Wide Web Click on a Description on the left, then click the Term that best fits the Description. Description Technolog
    5·1 answer
  • Python3
    7·1 answer
  • LaShawn would like to post photos in a social media app, but the program needs to be modified in order to display a greater vari
    12·2 answers
  • What is wrong with the following code? publicstatic char grade(int score) { if (score &gt;= 9) { return 'A'; } else if (score &g
    6·1 answer
  • How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
    12·1 answer
  • What does the word collaborative mean?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!