1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
11

Here you guys go im back didnt die or any thing gg for who ever gets this

Computers and Technology
2 answers:
Dmitry [639]3 years ago
6 0

Answer:

hello sir

Explanation:

Amanda [17]3 years ago
4 0

Answer:

ok cool

Explanation:

bet

You might be interested in
Choose all items that represent essential features of excellent navigation menu design.
balandron [24]

Answer:

A,B,D,E

Explanation:

4 0
3 years ago
Read 2 more answers
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
A banker would like to present a spreadsheet as part of a presentation to potential clients. The spreadsheet makes use of severa
Alekssandra [29.7K]

Answer:

subtotal function

Explanation:

The Microsoft Excel SUBTOTAL returns the subtotal of the numbers in the columns in a list or database, and it can be applied horizontally as well as vertically. And the SUBTOTAL function happens to be the built-in function in Excel which is categorized as the Math function or the Trigger function. And like a worksheet function, it can be inserted as a part of the formula inside a cell of a worksheet. Select the columns in a row, or rows in a column, and move to the Data tab in the ribbon. From there,  select the SUBTOTAL, and the function you would like to use, and press ok. And this means here the correct option is the subtotal function.

6 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
sertanlavr [38]

Answer:

Explanation:

IaaS - storage and network devices

SaaS - software upgrades and patches

MaaS - monitoring tools

PaaS - virtual computing platform

7 0
3 years ago
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
Other questions:
  • MATLAB graphics user interface:<br> Describe what Folder, Command Window and Workspace are.
    5·1 answer
  • List any four routes of transmission of computer virus. <br>please give me answer​
    8·1 answer
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • Alonzo collects bugs. He has created a fascinating display of large insects. Collecting bugs is a(n) _____ to Alonzo.
    10·2 answers
  • Technician A says that wheel speed sensors are a highly probable cause of illuminated EBC warning lamps. Technician B says that
    10·1 answer
  • Which of the following should you NOT do when using CSS3 properties to create text columns for an article element? a. make the c
    12·2 answers
  • Can you move it like this? I can shake it like that
    6·1 answer
  • Please helpppppppppp​
    8·1 answer
  • Two examples that cannot be performed by humans and that computers are used for instead​
    15·1 answer
  • What is the process of ensuring that corporate security policies are carried out<br> consistently?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!