1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
3 years ago
7

When people need information, they typically turn to:

Computers and Technology
1 answer:
denis-greek [22]3 years ago
6 0

Answer:

c -media

Explanation:

You might be interested in
What happens if you move unencrypted files into an encrypted folder?
mr_godi [17]
The new files become encrypted
6 0
3 years ago
How much time does a computer take to big calculations ?​
Alex17521 [72]

Answer:

one billion (9 zeros) is being reached fast – 15 seconds. but to get to one trillion (12 zeros) – the difference is amazing – 4 hours and 10 minutes. Basically 1000 times more.

Explanation:

6 0
3 years ago
Element primer a partir del qual es generarà l'energia central solar fotovoltaica
Juliette [100K]
No speak a Spanish ............
7 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
How major is the technology problem in the United States?
babymother [125]

Answer:

The technology problems in the U.S are like

New security threats. Headline-grabbing recent events may spark surprising new security threats, says Rick Grinnell, founder and managing partner of Glasswing Ventures. ...

Data protection. ...

Skills gap. ...

Multi-cloud security. ...

Innovation and digital transformation. ...

Finding new revenue streams. ...

Lack of agility. ...

Outsourcing risks. danger

Explanation:

Hope this helped!!!

4 0
3 years ago
Other questions:
  • Do clocks have cell's?
    15·2 answers
  • In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents
    7·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • Write a program (C++) that reads a number between 1,000 and999,999 from the user where the user enters a comma in the input.Then
    13·1 answer
  • By default, the Windows desktop displays
    6·1 answer
  • The meaning of belt drives
    10·1 answer
  • Have you ever tried to learn a new language or do you have friends who've had that experience? What are some of the steps you wo
    10·2 answers
  • You want to search for contacts in your email program. You enter the person’s first name and last name in the search box. You wa
    10·2 answers
  • Hey how was your day 50 points
    10·2 answers
  • What electronic devices do you use more frequently? And how much time do you use them?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!