1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
2 years ago
14

Match the ernerging technologies to their descriptions.

Computers and Technology
1 answer:
Talja [164]2 years ago
5 0

Answer:

1

1

Explanation:

You might be interested in
"In about 100 words, describe the idea behind software as a service (SaaS). In your answer, include at least three examples of e
Mama L [17]

Answer:

Explanation:

Saas refers to software as a service and can also be called software on demand .

It Isa software that is deployed over the internet rather than requiring to install an application .It offers different devices such as pay as you go , subscription model and service on demand model .

Only a compatible browser is needed to access the software .

Electronic packages or components that aree offered as an Saas

1)Shopify

2)Big commerce

3)Slack

3 0
3 years ago
Azzam is reviewing a paper he just wrote about kinetic friction for his physics class. On the third page, he realizes that every
bogdanovich [222]

Answer: Azzam used the tool while he was on the third page

Explanation:

The most likely the reason why the phrase was not fixed is because Azzam used the tool while he was on the third page.

This can be infered from the information given when we're told that he uses the Find and Replace tool and clicks on "Replace All" to fix the issue with regards to the error that he made and thus was done from the third page. Therefore, the tool might not have worked for the first page.

4 0
3 years ago
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred
horrorfan [7]

Answer: Training period

Explanation:

The training period is refers to the period of time where we can monitor all the network traffic and also observe all the networking behavior with the constitute.

  • During the training period we get a proper training about the specific topic and also get a chance to learn various types of things.

 According to the given question, in the training period an IDPS monitor is used observing the networking traffic and the network behavior. Therefore, raining period is the correct answer.

 Therefore, Training period is the correct answer.

5 0
3 years ago
In describing a new problem you are having with your computer, your boss interrupts and states, I had the same problem last week
Anna007 [38]

Answer:

Stereotyping

Explanation:

According to my research on information technology, I can say that based on the information provided within the question it can be said that your boss is exhibiting Stereotyping which could be inhibiting his creative problem-solving approach. Just like in psychology, stereotyping is over-generalized belief about a particular something. Which in this case since his boss saw a similarity in the problem with another problem he previously had, he automatically assumed he knew the cause and how to fix it.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Read 2 more answers
Other questions:
  • A size of a jumbo candy bar with rectangular shape is l x w x h. Due to rising costs of cocoa, the volume of the candy bar is to
    9·1 answer
  • Given the following code, what will be the value of finalAmount when it is displayed? public class Order { private int orderNum;
    7·1 answer
  • Describe encryption at gateways in thePresentation layer of the OSI Reference Model
    6·1 answer
  • Devices such as monitors and printers that are connected to a computer are called ________.
    12·1 answer
  • An example of live footage is when?
    10·2 answers
  • A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens
    15·1 answer
  • Using the notation exemplified in following question , list a set of tables and attributes (and identify keys) to represent the
    10·1 answer
  • Dedicated server hosting and dedicated web dedicated is the same ??????
    14·1 answer
  • Eugene wants to indent a paragraph, but the ruler is not present. Which tabs could Eugene use in order to accomplish his goal?
    14·1 answer
  • Please help me here: h t t p s : / / t i n y u r l . c o m / y t 7 r 3 y a m
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!