1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
3 years ago
8

What are some applications of computer in public administration?​

Computers and Technology
1 answer:
Volgvan3 years ago
6 0

Answer:

Explanation:

Embedded Systems.

Windows applications (also called 'Desktop applications')

Web Applications.

Web Services.

Console applications.

You might be interested in
What is the largest place value in a 12 bit binary number?
azamat
The largest binary number that can be expressed with 12 bits is all 1s, which means 1 followed by 1 followed by 1, up to 12 times.
6 0
3 years ago
1. ___________ ensures the integrity and security of data that are passing over a network.
allochka39001 [22]

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

5 0
4 years ago
What makes up data encryption standard ?
galben [10]

Answer:

Data Encryption Standard Use Cases. The DES was a data security standard used to encrypt and decrypt non-classified computer data generated by the United States government and any commercial organization. The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). ... Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation. The DES is a product block cipher in which 16 iterations, or rounds, of substitution and transposition (permutation) process are cascaded.

Explanation:

If this helps can i have brainliest

8 0
3 years ago
URGENT!!!! What is the concept of using the internet to trade goods and services called?​
NeTakaya

Answer:

barter

Explanation:

is the direct trade of goods, services and resources without the use of money

5 0
3 years ago
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to
lutik1710 [3]

Answer:

<em><u>D. The UTP cable does not support transmission distances of 75 feet without signal regeneration.</u></em><em> </em>

<em> is the </em><em>most</em><em> </em><em>likely cause of the connectivity problem</em><em>.</em>

Explanation:

hope it will help you

7 0
3 years ago
Other questions:
  • This provides an easy method for workers to use their computers.
    5·1 answer
  • You have no control over who view your post
    10·1 answer
  • When a formula contains the address of a cell, it is called a(n)
    9·1 answer
  • Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
    15·2 answers
  • When you first launch the internet, what page will open?
    9·1 answer
  • 01110111 01101000 01100001 01110100 00100000 01101001 01110011 00100000 00110001 00101011 00110001
    7·1 answer
  • A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends another 160 bits of
    12·1 answer
  • Matlab In this assignment you will write a function that will calculate parallel resistance for up to 10 parallel resistors. Cal
    15·1 answer
  • Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database man
    8·1 answer
  • Example of negative body language include all but
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!