1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
8

Classroom content transaction examples use of IT

Computers and Technology
1 answer:
padilas [110]3 years ago
6 0

Answer:

1. Online classes

2. Presentation

3. Account of books

You might be interested in
For which product would the producer keep a high profit margin and offer after-sales service?
Zina [86]

What are the products?

6 0
3 years ago
Source code is one particular representation of a software system. It highlights some details and hides others. This is a good e
grigory [225]

Answer:

Abstraction

Explanation:

Under fundamental principles of software engineering, the term "abstraction" is simply defined as the act of highlighting some details and hiding other ones.

Thus, the correct answer among the options is Abstraction.

8 0
2 years ago
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
When a customer makes a request or complaint, the goal of customer service is to
Brrunno [24]

Solution:

When a customer makes a request or complaint, the goal of customer service is to show the customer how to remain calm and courteous.

Because the work of the costumer care is  to serve as customers' first point of contact for complaints, questions, requests, feedback, or any other needs; these professionals are essentially charged with managing relationships between clients and the company.

Thus the required answer is D

7 0
2 years ago
Which of these is not part of a consumer profile??
matrenka [14]
Which of what? What is the complete question???
6 0
3 years ago
Other questions:
  • Rikki has had several problems at work recently. Her printer isn't printing correctly, copies from the copy machine come out wit
    8·2 answers
  • Why is it important to explore an Integrated
    13·1 answer
  • 33 points!!!!!!!!!!pls help
    15·1 answer
  • You are the IT administrator for a small corporate network. Recently, you added a web server that runs services that need to be
    12·1 answer
  • What is used in computer appliances and special-purpose applications, such as an automobile, ATM, or media player and is used fo
    5·1 answer
  • Which type of NAC agent will be used during the posture assessment before allowing access to the VPN users?
    9·1 answer
  • A_________is an orderly collection of fact & information.
    10·1 answer
  • Where can i watch bnha movie 2 online for free, with no sign up or pay?
    6·2 answers
  • By
    7·1 answer
  • What does Technology mean to you?​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!