1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
12

According to the video, what is used to create computer programs?

Computers and Technology
2 answers:
Lena [83]3 years ago
8 0
Its a or b. znskdbxkdb
Rufina [12.5K]3 years ago
8 0

Answer:

d maybe i don't know

Explanation:

You might be interested in
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
The Internet has made it possible for most people to order all of their clothing online. While this may be a preference for some
suter [353]

Answer:

Explanation:

Based on the information provided in this scenario it can be said that this is likely due to there being a cultural lag between having the Internet and using the technology to its full capacity. Cultural lag refers to the notion that culture takes time to catch up with technological innovations, mainly due to not everyone has access to the new technology. As years pass a specific technological advancement becomes more readily accessible to the wider public as is thus more widely adopted.

3 0
3 years ago
AI is not embraced everywhere in every industry because _______.
Nitella [24]

Answer:

See below:

Explanation:

AI is not embraced in every industry because of the type of industry and what it requires. In some situations, a human is needed since an AI cannot determine what to do and can sometimes even cause death.

AI isn't embraced everywhere because for some things we need a person, lets say for example, we need an AI to respond to 911 calls, that simply won't work due to the many situations and training the bot too will be a nightmare. For example, if a caller says a word that normal humans can understand, or a "code word" that every human knows but they haven't bothered to tell the bot, that will be the end of the line for them.

There are mutliple reasons to not use AI depending on the situation whether its life and death or just plain impractical.

7 0
3 years ago
How many bits would be needed to count all of the students in class today? There are 40 students.
Semenov [28]

Answer:

You would need 8 bits.

Explanation:

pls mark brainliest

3 0
2 years ago
Which statement describes the relationship between science and technology?
Elden [556K]
Answer: science is the study of the world, and technology changes the world to solve problems.
3 0
2 years ago
Read 2 more answers
Other questions:
  • Given the integer variables x and y, write a fragment of code that assigns the larger of x and y to another integer variable max
    5·1 answer
  • Consider the relation Courses(C, T, H, R, S, G), whose attributes can be thought of informally as course (C), teacher (T), hour
    10·1 answer
  • People use a computer connected to the internet to manage financial accounts
    15·1 answer
  • 3. Which of the following is called address operator?<br> a)*<br> b) &amp;<br> c).<br> d) %
    12·1 answer
  • 27. If X and Y are int type variables,
    14·1 answer
  • What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digita
    5·1 answer
  • Cual es la fiabilidad de la innovacion tecnologica
    15·1 answer
  • Fill in the blanks:<br>Can anyone help me out with this <br>​
    9·1 answer
  • Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to
    9·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!