1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leviafan [203]
3 years ago
12

Write a paragraph about ICT in personal life?

Computers and Technology
1 answer:
melisa1 [442]3 years ago
6 0

Answer:

Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications[1] and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage and audiovisual systems, that enable users to access, store, transmit, and manipulate information.

You might be interested in
Arrange the steps in the process of manually installing software.
Ahat [919]

The correct sequence is: 5,3,1,4,2

When you are installing software on your computer you need to first open the CD-ROM and then insert the installation CD into the CD-ROM. If the contents of the CD opens, click on the executable file to start the wizard, and then follow the prompts in the wizard. Finally, you often need to reboot your computer after installing a new program.

5 0
3 years ago
Does scope frequently changes during a project?<br>​
lesya [120]

Answer:

no

Explanation:

6 0
3 years ago
Read 2 more answers
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
Vlad [161]

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

3 0
3 years ago
Anyone willing to help with Excel?!!
anastassius [24]

Hi!

I have a slight understanding of excel, it depends on what you need.

8 0
3 years ago
When considering the typical characteristics of a server, how is the server optimized in relation to applications?
VLD [36.1K]

Answer: Server are optimized so that they can work efficiently and improve their performance while working. Application server optimization mechanism can be used for optimizing the server with respect to the application.

Some of the techniques used in the application server optimization are as follows:-

  • Load balancing- which helps in upgrading throughput ,improves the time of response, enhance the bandwidth of network etc.
  • Fail-over management- it is used for decrement of latency, balancing the server, increasing the availability of network and it resources etc.

3 0
3 years ago
Other questions:
  • If you want to import text into a DTP application that was first created in a word processing program, what must you do?
    9·2 answers
  • During what months do most people file their taxes?
    6·2 answers
  • Stress results from _______. A. Outside stimulus b. Internal stimulus c. Outside calm d. Internal calm
    12·2 answers
  • 2. Because technology is always changing, there are new applications being developed constantly. (1 point)
    9·2 answers
  • .The __________ comes in handy when I'm using Microsoft Word to type an essay with a specific word number requirement
    6·1 answer
  • What is an accurate definition of a goal?
    15·2 answers
  • 1.
    9·1 answer
  • which network component connects a device to transmission media and allows the device to send and receive messages?
    7·1 answer
  • WILL GIVE BRAILIEST
    9·2 answers
  • Which access object cannot be used to enter or edit data
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!