1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
12

Read the scenario and then choose which type of

Computers and Technology
2 answers:
marysya [2.9K]3 years ago
5 0

Answer:

employee list.

Explanation:

An employee list can be defined as a textual document that comprises of important informations such as names, contact address, gender, religion, next of kin, home address etc., about an employee working in an organization or business firm.

In this scenario, a human-resources director creates a report containing the names and contact information of employees at the company. Thus, this report represents an employee list.

The main purpose of an employee list is to provide a detailed description or information about all of the employees working in an organization at a specific period of time.

harina [27]3 years ago
4 0

Answer:

B; Employee List

You might be interested in
Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
fgiga [73]
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


3 0
4 years ago
What level of system and network is required for cui
galben [10]

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

6 0
3 years ago
Cybercrime has a serious economic impact on national and global economies that costs the _____ of its GDP every year.
maks197457 [2]

Answer:

World at least 1 percent

Explanation:

Cybercrime are crimes that focuses on networks of computers whereby a computer is used to commit the crime or a computer is the target of the crime, with the possible effect of a threat to the security and financial wellbeing of a person, an establishment or country

According to the report by Zhanna Malekos Smith and Eugenia Lostri, 'The Hidden Costs of Cybercrime' the monetary cost of cybercrime which is estimated at $945 billion is <u>a little above 1% of the World's GDP</u> which is around $87.55 trillion.

4 0
3 years ago
HELP LOTS OF POINTS! I WILL GIVE YOU 100+ POINTS IF ANSWERED CORRECTLY!!!
Delicious77 [7]

Answer:

E) all of the above

Explanation:

Your device can track your location, which means that it will tell where you've been. When you post on social media or just online, you are sharing what you're thinking. Your friends and family can easily be traced back to you, so they know who your friends and family are, and we leave evidence of what we've done because whatever you click gets tracked. hope this helps :)

4 0
3 years ago
Write a C++ program that takes a single character and prints the corresponding digit on the old-style dial or touchtone telephon
I am Lyosha [343]
Ok thanks Ianswer: c++
3 0
3 years ago
Other questions:
  • Whats included in ms office 2013 professional?
    10·1 answer
  • You are building a network and need to connect five computers in an office. They will be on the same network segment and you sho
    5·1 answer
  • In the MARS Marketing Management Simulation, the results of your marketing mix decisions:
    9·1 answer
  • _______ an embedded Word table to activate the Word features.
    6·1 answer
  • How can the function anotherFunc2 change the contents of the second element of t?
    5·1 answer
  • Which of these is a valid use of the Reply All feature?
    11·1 answer
  • Primary functions of lighting are sufficient light to...
    13·1 answer
  • Shop anywhere. Snap every receipt. Earn FREE gift cards! Sign up for Fetch with my code "DUEUY" and get 2,000 points when you sn
    13·1 answer
  • MyProgramming Lab
    5·1 answer
  • Complete the following sentence.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!