1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
9

Employers are looking for an employee?​

Computers and Technology
1 answer:
Rina8888 [55]3 years ago
7 0

Answer:

They are looking for a good work ethic and some experience, also positive representation from the employee for their company

Explanation:

You might be interested in
State what is meant by the terms: Parallel data transmission ...................................................................
Pavlova-9 [17]

Answer:

parallel communication is a method where several binary digits are sent as a whole, on a link with several parallel channels.

serial communication conveys only a single bit at a time over a communication channel or computer bus.

7 0
4 years ago
A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
dlinn [17]
A(n) anti-forensics process is initiated by individuals who are subjected to forensic techniques with the intention of hiding or obfuscating items or objects with evidentiary value.
4 0
3 years ago
What does the computer receive when you press a key on a laptop keyboard?
Anit [1.1K]

Answer:

a computer receives signal

6 0
3 years ago
The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
Lena [83]

Answer:

True is the correct Answer for the above question.

Explanation:

  • Computer security is a security in which data of the computer is secured from the access of unauthorized users. It is primarily achieved to stop the access grant to the unauthorized user.
  • It means that there is an authorization point which decides that the user is authorized or not. If the user is authorized then only he can enter the system otherwise he can not able to enter the system.
  • It helps to secure the data and the data is the important point of the computer system.
  • The question also states the same which is described above. Hence true is the correct answer.

3 0
3 years ago
How do you know if the website is secure if you make a purchase
marysya [2.9K]

Look for the lock symbol in the search section of your window/browser.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why is the show "Insatiable so awesome?
    12·2 answers
  • Litmus-type test strips are used to test coolant for freeze protection and ?
    12·1 answer
  • If more than one symbol is located immediately adjacent to another, it usually means that a multi gang box for multiple wiring d
    12·1 answer
  • What were the technological innovations that allowed for the rapid expansion of the railroads?
    6·1 answer
  • While waiting to be seated at a restaurant, Jason receives a customer loyalty coupon through an app on his mobile phone for half
    7·1 answer
  • An oligopoly is a unique market structure. Which of the following is NOT necessary to have a oligopolistic market structure?
    10·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • Does the colour intesity change of the liquid if you add more baking soda?​
    6·1 answer
  • Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!