1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
7

D State Six Impact of ICT the society​

Computers and Technology
1 answer:
Ugo [173]3 years ago
6 0

Answer:

  1. home
  2. office
  3. bank
  4. hospital
  5. hotel

Explanation:

ICT is a device that display and command information outside.

You might be interested in
PLEASEEE HELPPP
yan [13]

Answer:

to prevent anyone from discovering it

hope this helps you

<h2>❤itz Indian heart ❤</h2>
3 0
3 years ago
What was the most surprising thing you learned this term? Why did it surprise you? ​
vaieri [72.5K]

Answer:

is this just a small question you are asking the world?

Explanation:

because i am not fully understanding this, could you please give further detail?

8 0
3 years ago
Ill give alot of points if you answer: How do I get a 100 dollar ps4
stepladder [879]
Uh how do you get a little blue box in a sandwich
8 0
3 years ago
Read 2 more answers
The number of worksheets a workbook can contain is limited to the ______ of your computer.
KiRa [710]
<span>The number of worksheets a workbook can contain is limited to the memory of your computer.
The computer memory denotes the </span><span>hardware integrated circuits in the computer. These circuits store information for immediate use in a </span><span>computer, for worksheets for example.</span>
6 0
3 years ago
Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
AnnyKZ [126]

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

  • SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.
  • No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.
7 0
4 years ago
Other questions:
  • Which element of the word program window contains buttons for saving a document and for undoing, redoing, and repeating a change
    5·1 answer
  • Which one of the following is not the name of a 20th century school composition
    14·2 answers
  • Which of the following statements is true of dpi?
    10·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • Which is the most likely reason film companies expanded so quickly?
    8·1 answer
  • Use the Law of Sines to solve the triangle. Round your answers to two decimal places.
    6·1 answer
  • What is this car first to awnser is the brianliest
    5·2 answers
  • What does the revolver do computer science​
    9·1 answer
  • In remote areas,your gps device may lose reception. its good idea to have a
    13·1 answer
  • a client device on your network is trying to authenticate via radius proxy, but is failing. you check the relevant policy on the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!