1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
14

What do we do if IOC is called on the intercom ??

Computers and Technology
1 answer:
laiz [17]3 years ago
5 0

Answer/Explanation:

Get out of sight of the intruder

Intruder On Campus

You might be interested in
Whats my screen name?
adoni [48]
It could be any thing of your chose
8 0
3 years ago
Read 2 more answers
You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
Harrizon [31]

The best chart to see the data distribution for the exercise routine would be a pie chart. Using Microsoft Excel, you can input each data point you have for all you exercise routine category, and generate a pie chart which will show you the percentage for each category in comparison to the total.


5 0
4 years ago
Read 2 more answers
What are the names of each devices pleaseee​
nignag [31]

Answer:

the answer is computer, phone, laptop

Explanation: that is all ik

3 0
3 years ago
Read 2 more answers
A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as
Contact [7]

Answer:

C) Router

Explanation:

In computer networking, the router's function is to stand in between diferent data lines and control the flow of data packets.  When a packet arrives from one direction, it reads the address information in the header to determine its direction. Note that the data lines will contain different IP addressing scheme, so considering the scenario in the above question, since the offices use different IP schemes, a router will serve the purpose of directing data packets to allow communication.

6 0
3 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Other questions:
  • You can select slide objects in order to delete them simultaneously by pressing the _____ key as you click each object. select o
    7·2 answers
  • All users on the network have antivirus software; however, several users report that they have what an administrator described a
    10·1 answer
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access t
    12·2 answers
  • FS and GS are two___________________ in protected mode.
    14·1 answer
  • How to create an app on app store please its not a joke, if someone knows tell me how
    15·1 answer
  • What happens when text is added to grouped objects that is larger than an object ?
    9·2 answers
  • Hard disk works on the following technologies: (i) Technology used within the hard drive to read & write data to the drive a
    11·1 answer
  • After creating a webpage with html code, what do you need to do so that others can access it on the internet?.
    11·1 answer
  • Which tools can help you gather information about the processes running on a windows operating system?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!