1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
14

Exercise 2:in many cinemas today audiences watch advertisements before the feature film begins, what kinds of ads would you expe

ct to be shown to audience before the films?
plz help to answer this​? I'll waiting until tomorrow

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
4 0

Answer:

we see advertisements before feature of film begins.expected ads are:

it must be good for us physically and mentally.

which must be helpful,motivate us.which makes us honest kind and loving.I hate advertisements of video game.it is just waste of time

You might be interested in
This refers to the people involved in the data processing operation.
yawa3891 [41]
The people involved in the data processing operation are known as <span>Peopleware.</span>
6 0
3 years ago
There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat
7nadin3 [17]

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


8 0
3 years ago
Read 2 more answers
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
4 years ago
Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it?
Svet_ta [14]

Answer:

The answer to the questions: Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it? Would be as follows:

1. Yes, Kennesaw State University, a university in Georgia, does have a computing ethical policy that regulates the proper use of the facilities and computing services within the facilities of the university and the use of computing equipment that belongs to the university. This policy is known as the KSU Computer Usage Policy.

2. As said before this policy establishes that the use of computing services are not the right of a person, but rather a privilege afforded to the students, faculty and other people who are present in the university and who may need to use its computing services. The use of the computing services would be whitin this policy as long as it stays inside the delimitations established by federal, state and University policies.

Explanation:

7 0
4 years ago
Provide an example of an IT project from your readings, experience, and/or other sources and discuss some of the challenges face
vlada-n [284]

Answer:

kindly check the explanation.

Explanation:

Getting any project to be a successful one is not an easy task at all as many projects failed even before it nears completion stage. The Project Management Institute[PMI] states that only 69% [mean percentage] are able to complete and meet the original goals for and business intent of the project.

The reasons behind this failed IT projects are numerous, few of them are given below:

=> <em>When estimates for the IT project is inaccurate. Th inaccuracy  do cause IT projects to not meet the target. </em>

<em />

<em>=> When the available resources are not enough and there is poor project management it causes the IT projects to fail.</em>

<em />

<em>=> When team members are not diligent. The procrastination of team members do lead to failed projects.</em>

<em />

The ways that such problems can be overcome in order to to achieve successful outcomes is given below;

=> Someone should be held accountable. That is there should be a seasoned and qualify project manager to supervise the project and can be hold accountable for how things turns how to be.

=> The scope of the project should be flexible so that when things changes the plan can also change.

=> Making sure that all the estimates are accurate.

7 0
3 years ago
Other questions:
  • In which file format is image data compiled into a binary file? TIFF SVG CGM BMP
    11·1 answer
  • The calcCircleCircumf() method invoked within in the CircleStatsTester class is overloaded. Write the overloaded methods in the
    8·1 answer
  • Which access modifier is not allowed in a struct? Private Public Protected Internal All of the Above None of the Above A block {
    11·1 answer
  • Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of ol
    8·1 answer
  • Supplies/material used in iron​
    11·1 answer
  • I need help ASAP please and thank you!
    14·1 answer
  • What is the computer?​
    9·1 answer
  • It displays the contents of the active cell. It allows you to enter and edit data, such as formulas.
    8·1 answer
  • Which tab do you open to access the Comments feature?
    11·1 answer
  • Enter a formula in cell C13 to look up the registration fee for the first vehicle. Use the vehicle type in cell C4 as the Lookup
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!