1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
14

How you use ict today and how will you use it tomorrow

Computers and Technology
1 answer:
kari74 [83]3 years ago
6 0

Answer:

you use it in water today

Explanation:

tomorrow you'll use it in soda

You might be interested in
Andy wants to install a new Internet connection. He wants to take the fastest he can get. What are the maximum speeds for the fo
aksik [14]

Answer:

1. so if i wanted to build a linux server for web services(apache) with 1cpu and 2 gb of memory.-operating at 75% of memory capacity2. a windows server with 2 cpu/ 4gb memory- operating at 85% of memory capacity3. a storage server with 1 cpu/ 2gb memory- operating at 85% of memory capacityhow much memory do i have to add for each server. so that the utilization rate for both cpu and memory is at a baseline of 60%."the details for the cpu like its processor or the memory's speed isnt to be concerned" yeah i kept asking my teacher if he's even sure about the but the whole class seems to be confused and the project is due in 3 days..this is a virtualization project where i have to virtualize a typical server into an exsi hypervisor.

5 0
3 years ago
An isp is a group of updates, patches, and fixes that apply to specific oss.
olasank [31]
<span>The statement that an ISP is a group of updates, patches, and fixes that apply to specific OSs is false.
</span> ISP stands for Internet service provider, while OSS stands for Operations support system.<span> The term ISP denotes a company or</span><span> organization that provides services for accessing, using, or participating in the Internet. OSS on the other hand is used by the providers to manage their networks.
</span>
4 0
3 years ago
What will be the output of the following query on the table below?
shtirl [24]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
What is a attack vector<br>​
kogti [31]

Answer: A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology

Explanation:

give me a Brainliest

3 0
3 years ago
Random access iterators are ____ iterators that can randomly process elements of a container.
olga nikolaevna [1]

Answer:

C. Bidirectional

Explanation:

If we want to access elements at an any random offset position then we can use random access iterators.They use the functionality 'as relative to the element they point to' like pointers.Random access iterators are Bidirectional iterators that can randomly process elements,pointer types are also random-access iterators.

6 0
3 years ago
Other questions:
  • A website wants to gives out detailed information to viewers about its upcoming conference and also provides a feature for searc
    10·1 answer
  • Why is peer answer always not working? just wondering idk why
    7·2 answers
  • Im being timed please help!!
    7·2 answers
  • The ability of services to grow or shrink based on need is called __________.
    14·1 answer
  • The marketplace is the essence of which of the following?
    11·1 answer
  • When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo
    15·1 answer
  • What would be the best thing you could do to prepare yourself to work for a company that has embraced globalization. A) learn ho
    12·2 answers
  • Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept
    5·1 answer
  • Which feature of dart helps in making the code readable,maintainable and finds type error during compile time
    15·1 answer
  • In a relational database application, a(n) ________ key is used to link one table with another.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!