1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
11

Please help This is a homework in ICT class

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
8 0

Answer:

ejwksjnsskawii28393939393030jedjdjjccjncncnccnnccn

Explanation:

jsskaaaahujpjbhdueiwiwopwpwpwwieuehbfcnnccjxkxooss8ahwhwwnekdodod8djhdmslwoaishwhwkqoq18829293i4644673819191jednsmzljesksowlwlwpwpwnwkpwwwww waaaaayushsjsnmssoss ss sosijw

You might be interested in
Write in general about ergonomic injuries and also mention the symptoms that computer users exhibit when they experience these s
Tema [17]

Ergonomic injuries are caused by ergonomic risk factors like awkward or sustained postures, strain, contact pressure, exposure to vibration and exposure to heat or cold. Over time, a combination of these factors may lead to injury, pain, and disability. Ergonomic injuries which can directly or indirectly be related to work environment can affect the nerves, tissues, muscles, tendons, and joints. For instance, on average, an employee may spend about 6-8 hours on the computer.

<span>The symptoms that computer users may exhibit when they experience these musculoskeletal disorders include pain in the shoulders, upper or lower back and the neck. Others include discomfort when making certain movements, loss of coordination, general feeling of cramping, weakness of muscle function, and a sharp burning stabbing  pain in the wrists.</span>
3 0
3 years ago
Read 2 more answers
User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not
Goryan [66]

Answer:

False

Explanation:

A User Authentication is a process in which you verify that someone who is attempting to access services and applications is who they claim to be. This can be accomplished through a variety of authentication methods, such as entering a password into your laptop or phone or a PIN number into the ATM. Authentication is essential when you have content that you wish to protect and provide only to specific, approved clients.

3 0
3 years ago
What is a detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy
Sonbull [250]

Answer:

"Compliance audit " seems to be the correct answer.

Explanation:

  • A compliance or enforcement audit seems to be a systematic analysis of the conformity of such an agency to the reporting requirements and guidelines.
  • In a compliance audit, independent auditors determine the extent and completeness of enforcement plans, security protocols, user authentication, including risk management framework.
8 0
3 years ago
"The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
aleksklad [387]

Answer:

The transport layer

Explanation: Layer 4, is the transport layer of the Open System Interconnection (OSI), that handles message transfer of data between end systems or hosts and ensures complete packets transfer.

7 0
3 years ago
Read 2 more answers
What does UDP stand for?
sleet_krkn [62]
User Datagram Protocol
3 0
3 years ago
Read 2 more answers
Other questions:
  • After applying transitions to his presentation, Omar uses the Slide Show feature to view the them. He notices that the transitio
    9·2 answers
  • The organization of logistics activities within a firm depends on a number of factors, including the number and location of cust
    10·1 answer
  • In Rizzati Corp, vice presidents in departments such as engineering, manufacturing, IT, and human resources report directly to t
    15·1 answer
  • _______is the equal distribution of visual weight on either side of an imaginary axis through the center of a design. A building
    6·2 answers
  • While saving her word-processed academic documents, Ashley includes the subject, title, and the author's name in the properties.
    7·1 answer
  • During the Inspect and Adapt event, how are reflection, data collection, problem solving, and identification of improvement acti
    5·1 answer
  • Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of ol
    8·1 answer
  • The bag class in Chapter 5 has a new grab member function that returns a randomly selected item from a bag (using a pseudorandom
    8·1 answer
  • Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc
    12·1 answer
  • Consider legal issues and intellectual property concerns when creating computer programs?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!