1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
12

Read the scenario below, and then choose the right type of computer for each person from the drop-down menus. Three of your frie

nds are in the market to purchase a new computer. Sera does not have a big budget, but she needs a portable computer. Arturo is worried about viruses and has a high budget. Portability is not an issue. Kazuma wants a computer that does not cost too much and is easy to upgrade.

Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
7 0

Answer:

- laptop running Windows

- desktop computer running a Mac OS

- desktop computer running Windows

Explanation:

just took it on edg

You might be interested in
2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
Leto [7]

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

4 0
3 years ago
If consumers start to believe they need a product, what is likely to happen
makvit [3.9K]
B I believ not sure tho
8 0
2 years ago
This type of method method performs a task and sends a value back to the code that called it:
Thepotemich [5.8K]

Answer:

Option 4: Value-returning

Explanation:

In programming, a method is a named section of codes that perform a specific task. This is possible to define a method that return a value after performing its task. This type of method is known as Value-returning method.

For example, we can define a method addition that takes two inputs, x, y and return the summation of x + y to the code that called it. The codes are as follows:

  1.    public static void main(String[] args) {
  2.        int sum = addition(3, 5);
  3.    }
  4.    
  5.    public static int addition(int x, int y){
  6.        return x + y;
  7.    }

6 0
3 years ago
Name:
Elanso [62]
1 6gb of ram
inteel
500gb
500gb
4 0
3 years ago
A server-side extension ________________. provides its services to the web server in a way that is totally transparent to the cl
damaskus [11]
A: provides its services to the Web server in a way that is totally transparent to the client browser.
8 0
4 years ago
Other questions:
  • In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
    7·1 answer
  • Selecting the option to control Widows and Orphans will prevent _________. A single line from appearing at the top or bottom of
    10·1 answer
  • In general terms, a program that is broken into smaller units of code such as methods, is known as a ________
    6·1 answer
  • If I want to have an estimate of the number of people who visited my website, which metric should I use?
    5·2 answers
  • What is a DreamScape?<br> Explain <br> and give example (if you want)
    10·1 answer
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Anyone know how to fix black screen of death on computer​
    6·1 answer
  • What makes you normally visit the site-graphics, layout, or content? Why?​
    8·2 answers
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    11·2 answers
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!