1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
5

When operating a user interacts with

Computers and Technology
1 answer:
forsale [732]2 years ago
8 0

Answer:

The operating system

Explanation:

You might be interested in
Given half a chance other people at work will take advantage of you
Damm [24]

have self-control and if you have a problem dont be afraid to speak your mind, show other people you mean buisness, but be polite to aviod starting more problems

3 0
3 years ago
Online activities among businesses
Masja [62]

Some of the online activities among businesses are:

  • SEO consultant. ...
  • Web designer or web developer. ...
  • Blogger. ...
  • Virtual assistant. ...
  • Affiliate marketer, etc

<h3>What are Online Activities?</h3>

This refers to the various activities that are done on the world wide web and is usually used by businesses to increase visibility, and in turn, revenue.

Hence, we can see that the use of online activities by businesses are important because the products and services for sale by businesses are advertised to target audiences through some of the aforementioned activities.

Read more about online activities among businesses here:

brainly.com/question/27172895

#SPJ1

3 0
1 year ago
The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
kipiarov [429]

<span>The asthenosphere is a part of the upper mantle just below the </span>lithosphere<span> <span>that is involved in </span></span>plate tectonic movement<span> <span>and </span></span>isostatic<span> <span>adjustments. The lithosphere-asthenosphere boundary is conventionally taken at the 1300 °C </span></span>isotherm<span>, above which the mantle behaves in a rigid fashion and below which it behaves in a </span>ductile<span> fashion. a</span><span>nd </span>flows very slowly, in a manner<span> similar to the ice at a bottom of a glacier.</span>

5 0
3 years ago
Read 2 more answers
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
3 years ago
___ involves connecting geographically remote computers into a single network and combining the computational power of all compu
insens350 [35]

Answer:

grid computing

Explanation:

<h2><u>Fill in the blanks </u></h2>

<u>grid computing</u>  involves connecting geographically remote computers into a single network and combining the computational power of all computers on the network. It takes advantage of the the fact that most computers use their central processing units on average only 25 percent of the time, leaving 75 percent of their capacity available for other tasks. A super computer Nanotechnology A workstation Grid computing Green computing

6 0
3 years ago
Other questions:
  • Which of the following statements is true?
    6·1 answer
  • The network ____, the person overseeing network operations, uses a server operating system to add and remove users, computers, a
    15·1 answer
  • Given the commands below, what do they do? for (position = 1 through aList.getLength()/2) { a = aList.getEntry(aList.getLength()
    11·1 answer
  • As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
    8·1 answer
  • Do you agree that technology can be used to commit acts of violence ? Explain why or why not
    11·1 answer
  • How does netbios identify a computer system on the network?
    13·1 answer
  • Please anyone, help me.... I'm not sure how to put these all together.<br> 35 points!
    15·2 answers
  • the ghost adventures team uses a variety of tools and technology in investigations. which one is described as an adjustable freq
    9·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
  • Provide 3to 4 sentence overview of microsoft windows features?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!