1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
6

Everyone type "yes sir" it is a meme

Computers and Technology
2 answers:
cupoosta [38]3 years ago
7 0
Answer: yes sir



Explanation: yessirrr
mars1129 [50]3 years ago
4 0

Answer: yes sir

Explanation:

You might be interested in
My computer just fried anybody know why it did that?
pochemuha
You was probably was too MLG and it blew its top my boy !
7 0
3 years ago
Read 2 more answers
How do i build a supercomputer.?
stira [4]
You will need one head node, at least a dozen identical compute nodes, an Ethernet switch, a power distribution unit, and a rack. Determine the electrical demand, cooling and space required. Also decide on what IP address you want for your private networks, what to name the nodes, what software packages you want installed, and what technology you want to provide the parallel computing capabilities
3 0
4 years ago
When we focus on stereotypes we may ___________________. a. experience culture shock b. develop ethnocentrism c. unconciously lo
alisha [4.7K]
When we focus on stereotypes we may <span>unconsciously look for information to support our generalizations .</span>
3 0
3 years ago
Read 2 more answers
Meghan signs into zoom to attend a video call for her online class. what kind of cloud service is she using?
Doss [256]

Meghan signs into zoom to attend a video call for her online class. She is using a SaaS cloud service.

What is cloud service?

A variety of services that are provided to businesses and customers on demand over the internet are referred to as "cloud services." With no internal infrastructure or hardware required, these services are intended to offer quick, economical access to resources and applications.

What is the main purpose of cloud services?

Access to computing resources and IT services should be simple and scalable, whether the cloud is private or public. The hardware and software elements necessary for the efficient use of a cloud computing architecture are included in cloud infrastructure.

What is a SaaS cloud service?

Using the software as a service (SaaS) paradigm, a cloud provider hosts programs and makes them accessible to customers online. The program will be hosted by a third-party cloud provider under this arrangement, which an independent software vendor (ISV) may agree to. Or the cloud provider may double as the software vendor for major organizations like Microsoft.

Learn more about cloud service: brainly.com/question/11014710

#SPJ4

5 0
1 year ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • PLEASE HELP ASAP!!! 50 POINTS FOR TWO DIGITAL TECHNOLOGY MULTIPLE CHOICE QUESTIONS!!!
    13·1 answer
  • What is fair use?
    15·2 answers
  • PLEASE HELP ASAP
    13·2 answers
  • Someone wanna be in a meeting with me <br><br><br> Code: rrx-ofrw-ocj
    5·2 answers
  • Which of the following BEST describes Computer Science (CS)?
    8·1 answer
  • How does science impact the technology?
    8·2 answers
  • g Write a function number_of_pennies() that returns the total number of pennies given a number of dollars and (optionally) a num
    7·1 answer
  • Given the IPv4 address in CIDR notation 215.200.110.50/25, identify the subnet IDs.
    15·1 answer
  • 66 POINTS HELP
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!