1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
11

Cómo surge y cuál es el objetivo del observatorio de radio y televisión

Computers and Technology
1 answer:
Tanya [424]3 years ago
4 0

Answer:

No spanish sorry

Explanation:

You might be interested in
What happens when a filter is applied to a database?
Genrish500 [490]
Hello there.

<span>What happens when a filter is applied to a database?

</span><span>Some records are permanently removed from the database.
</span>
5 0
3 years ago
A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
Anuta_ua [19.1K]

The safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

<h3>What is encryption?</h3>

The process to convert data into a coded message that conceals its real meaning is known as encryption.

As we know,

Key escrow is the security measure that makes it possible for a reliable third party to own a copy of the encryption key.

Electronic cash systems employ encrypting to secure traditional transaction information like account information and activity amounts.

Thus, the safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

Learn more about encryption here:

brainly.com/question/17017885

#SPJ4

7 0
2 years ago
In order to avoid slipping in the shop, your footwear should ___________.
Arisa [49]

Answer:

b

Explanation:

has traction so it can grip

4 0
3 years ago
Which of the following trims would be used at the beginning of a scene?
Ad libitum [116K]

Answer: a i think

Explanation:

6 0
3 years ago
A simple CPM network has five activities, A, B, C, D, and E. A is an immediate predecessor of C and of D. B is also an immediate
Dmitrij [34]

Answer:

True

Explanation:

There are four paths in this network. A is an immediate predecessor of C and of D. B is also an immediate predecessor of C and of D. C and D are both immediate predecessors of E. Given the above scenario

4 0
3 years ago
Other questions:
  • List the step in turning on a computer
    6·1 answer
  • Which components can be added to a lightning app on custom object (choose 3 answers)A. Visualforce B. Standard Lightning compone
    6·1 answer
  • What method of research deals with large amounts of information that is analyzed and presented statistically?
    9·1 answer
  • When the Hyper-V role is added to a Windows Server 2016 server, the hypervisor creates the individual environments, each of whic
    5·1 answer
  • How should you behave in an online academic environment?
    7·2 answers
  • What is the first step in finding a solution to a problem
    13·1 answer
  • How to look at things you previously applied to on handshake
    13·1 answer
  • Write a statement that declares an anonymous enumerated type with the enumerators SMALL, MEDIUM, and LARGE.
    13·1 answer
  • 3. What of the following is the main components of computer system?
    9·2 answers
  • Using programming libraries is one way of incorporating existing code into new programs.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!