1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
3 years ago
15

Analyze,understand and interpret these picture​

Computers and Technology
1 answer:
Ganezh [65]3 years ago
6 0

Answer:

hi

Explanation:

As you can see in the picture, only books can save a person who spends a lot of time on social networks and on the phone. Because some people lose valuable time just by doing nonsense on social media. Books can save us.

hope it helps

have a nice day

You might be interested in
Jack follows the steps below.
Eddi Din [679]

Answer:

D is my answer to this question.

5 0
3 years ago
Read 2 more answers
What key should you press to display the spelling and grammar dialog box
GalinKa [24]
<h3>f7 should open the spelling and grammer dialog box</h3>
7 0
3 years ago
Read 2 more answers
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
1.
Otrada [13]

1. color saturation is the intensity and purity in a color as displayed in an image.

6 0
3 years ago
A collaborative web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.
avanturin [10]
<span>A collaborative Web page that is designed to be edited and republished by a variety of individuals is called ad Wiki. A wiki is a server program that allows users to collaborate in forming the content of a Web site. The term comes from the word "wikiwiki," which means "fast" in the Hawaiian language.The simplest wiki programs allow users to create and edit content.</span>
4 0
4 years ago
Other questions:
  • Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
    5·1 answer
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • Minerals that contain the elements silicon and oxygen are called ______.
    7·1 answer
  • The part of the eye thats similar to the film of a camera is the
    7·1 answer
  • When you move into a new home or apartment, the first thing on your checklist should be to have the ____________ changed. (5 Let
    13·1 answer
  • PLS PAK I ANSWER NITO KAILANGAN LANGPO​
    6·1 answer
  • In 5-10 sentences, describe the procedure for responding to an e-mail message.
    5·1 answer
  • List some of the cautions related to costume change
    8·1 answer
  • Which of the following is an operating system?<br> MacBook Air<br> Windows 10<br> Dell
    13·2 answers
  • Identify a characteristic that is a disadvantage of cloud-based hosting.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!