1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
14

О OFTypes icts commonlyin education.used​

Computers and Technology
1 answer:
Kipish [7]3 years ago
8 0

Answer:

The types of the itcs can be defined as follows:

Explanation:

It stands for the information and communication technology, which is used to comprises products that are a store, process, pass, transform, replicate or receive digital communications. 

It applies to all technology of interaction, such as the Internet, wireless networks, devices, laptops, middleware, video - conferencing, social media, and other software and services in media, and the four types in which it is used in education can be defined as follows:

(i) networking for education

(ii) Web-based education

(iii) mobile education

(iv) facilities for the classroom

You might be interested in
The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the Major
LiRa [457]

Answer:

apply a filter by age with a value more than 20

Explanation:

First, we must create the spreadsheet with the fields student, age, grade level, major and minor.

For example:

If we want to create a filter, we must mark headings with the left click, then we must go to the tab Home --> at the section Editing, click in Sort & filter then Filter.

We must click in the field Age --> number filters --> greater than 20.

8 0
4 years ago
1) You are working with an organization as a network manager. The organization has
pantera1 [17]

Answer:

Explanation:

a. In this specific scenario, the best option would most likely be a site-to-site VPN. This would allow each office to be independently connected to the internet and at the same time be connected to each other securely and efficiently. There should be unnoticeable or no delay at all between the two offices and sensitive files will be completely secure. Therefore, the two offices can easily transfer data securely between one another without fear of the data being intercepted.

b.  The same VPN network would work on the head office, but instead we can implement firewall restrictions to the head office network itself. These restrictions would prevent any or all incoming connections that are trying to request data from the local head office network. This would allow the head office to continue working without worry of unwanted intruders in their network.

7 0
3 years ago
The true or false questions.
tankabanditka [31]

Answer:

false

Explanation:

-exec option is not mandatory for the find command.

find will still list out the identified files even in the absence of -exec option.

For example:

find . -name test -print

will print out files with the name 'test' in the current directory. Note that there is no exec option in this example.

Same holds true for find with no additional options at all.

For example:

find .

will list out all files in the current directory.

3 0
3 years ago
Why do software developers prefer to use high-level language to author programs?
Charra [1.4K]

Answer:

The answer to this question is given below in the explanation section

Explanation:

The correct answer to this question is: it used a more English-like syntax.

The software developer use high-level language to develop or author the program because it is more likely to English syntax and it would be easy for a software developer to author a program easily instead of using low level language and remembering ones and zeros.

Other options are not correct because:

It can be used on computers without microprocessors: Each computer has a microprocessor either you develop a program using high-level or low-level languages. Changes and modifications are easy in high-level language than in low-level languages. so, the option that prevents anyone from making changes to the software later is wrong.  However, high-level languages are less complicated in learning and in authoring the programs but it does not use zeros and ones, it uses English-like syntax. So, the last option is also wrong.  

4 0
3 years ago
If you have a database with birthdates, and you would like to find everyone who was born before June 16, 1967, what would you en
Tcecarenko [31]

Answer:

<June 16,1967

Explanation:

7 0
4 years ago
Read 2 more answers
Other questions:
  • Suppose an instruction takes 4 cycles to execute in an unpipelined CPU: one cycle to fetch the instruction, one cycle to decode
    10·1 answer
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • Sanjay is giving a slideshow presentation on his entire college class and he is feeling quite nervous in order to share his pres
    9·1 answer
  • What is the internet?
    5·2 answers
  • Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information f
    8·1 answer
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user.
    13·1 answer
  • Apps are designed by___.
    11·2 answers
  • What is the main function of the output on a computer or what is it use for? ​
    15·2 answers
  • How do i delete cookies on a chromebook?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!