1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
14

5 efectos del desarrollo tecnológico en el medio ambiente

Computers and Technology
1 answer:
sineoko [7]3 years ago
5 0

Answer:

english plzzz

Explanation:

You might be interested in
36
Nostrana [21]

The way that the understanding branding help explain why those who go viral for public behavior get fired is option  C. Their behavior shapes consumer understanding of the employer’s brand.

<h3>How would you define branding?</h3>

A brand is a good, service, or idea that is publicly set apart from similar ones. This makes it simple to convey and generally promote. The process of developing and promoting a brand's name, attributes, and personality is known as branding.

Note that Branding is defined as the marketing strategy of developing a name, symbol, or design to identify and set apart a product from competing goods. You get a significant competitive advantage in marketplaces that are getting more and more cutthroat.  So, it goes a long way to tell what a company stand for.

Learn more about branding  from

brainly.com/question/24456504
#SPJ1

4 0
1 year ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
AYUDAAA..... DARÉ TODOS LOS PUNTOS QUE PUEDA.
Eddi Din [679]

Answer:

HELP ... I WILL GIVE ALL THE POINTS IT CAN.

THE QUESTIONS ARE:

1. ACCORDING TO THE SUBCLASSIFICATION OF EACH WEB SITE AS YOU WOULD DEFINE THE TYPES OF THE WEBSITE.

2. WHAT IS THE DIFFERENCE BETWEEN EACH SUBCLASSIFICATION OF THE WEBSITES

3. LIST EXAMPLES OF EACH SUBDIVISION

THE SUBCLASSIFICATIONS IN QUESTION ARE: SITE BY HEARING, BY DYNAMISM BY OPENING, BY DEPTH AND BY OBJECTIVE

Explanation:

What is the question needed to be answered?

3 0
3 years ago
Explain what is a database schema and mention one example
Taya2010 [7]

Answer:

Database schema is a structure that are used to represent the logical base in the database. Database schema is the logic arrangement of objects in the form of tables. It basically defines the entities and the relationship between them. Schema is the organisation of data in the database system.

It is divided into two main parts that is:

  • Logical database schema
  • Physical database schema

Example:

When we create a table with the student name then, the logical database schema contain the student name, student ID and the project name. Then, the student table basically stored in the physical database schema in the form of file.

4 0
4 years ago
Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
Alexandra [31]

Answer:

Explanation:

b

7 0
3 years ago
Other questions:
  • What is a Network-layer routing technology that enables a group of workstations to share a single registered address?
    5·1 answer
  • Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
    9·1 answer
  • An example of live footage is when?
    10·2 answers
  • CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site
    8·1 answer
  • You can access various sites on the www by using hyberlinks or by
    15·1 answer
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • Which windows 10 edition can a device with windows 8 or 8.1 pro upgrade to
    5·1 answer
  • Community gardens are public gardens where local residents can grow plants in a plot. They are very popular, so there are often
    7·1 answer
  • All of the followingshould be followed by entrepreneur for being effective
    10·1 answer
  • If a person's mobile phone was designed to work with 4G technology, what will happen when a 5G network is rolled out in their ar
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!