1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
15

What is e-governence?What are the advantage of it.​

Computers and Technology
1 answer:
kondaur [170]3 years ago
5 0

Answer:

The advantages of e-government include an improved flow of information from citizen to government, government to citizen, and within government itself. Additionally, e-government helps modernize administration procedures, improving economies and promoting transparency in the process.

E-government is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region.

You might be interested in
What is one major component that would not be found in a tablet or phone, and how has modern computing made that component less
IRISSAK [1]

Answer:

A hard drive

Explanation:

Since tablets and phones are compact, they are better off not having a big, giant, bulky storage device like hard drives. Modern computing made hard drives less important by developing Solid-State Drives (SSDs) and extremely dense (512 bit) storage that can provide the same if not more storage than a traditional hard drive at the fraction of the size.

5 0
3 years ago
Read 2 more answers
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
Phantasy [73]

Answer:

Port scan targeting 192.168.1.106.

Explanation:

In the following question, there is some part of the question and options is missing.

In the following statement, when a file log is taken from the computer system which has Internet Protocol address is given in the statement and by the further details of the statement in which time and the port destination by examine those details of the Internet Protocol, the following port scan targeting the IP address 192.168.1.106.

3 0
3 years ago
How does the luminosity of this star compare with that of the other three (hip 87937, hip 108870, and tau cet)?
Afina-wow [57]

Answer:

Regulus is the most luminous. Regulus is the least luminous

Explanation:

  • Transcribed image text: Of the three stars you've observed (HIP 87937, HIP 108870, and Tau Cet), which one is more luminous?
  • View Available Hint(s) Tau Cet O HIP 87937 O HIP 108870
  • They have the same luminosity.

To learn more about it, refer

to https://brainly.in/question/413163

#SPJ4

6 0
2 years ago
Asymmetric encryption uses (choose all that apply):
yan [13]
Asymmetric uses two different keys (Public keys and private keys) for both encryption and decryption of data.  It is s any cryptographic<span> system that uses pairs of keys: public keys which may be distributed widely, and private keys which are known only to the owner.</span>
7 0
3 years ago
Pls help me awnser this I will give points
joja [24]

Answer:

first one is "int" second one is "string" and third one should be "float"

Explanation:

not sure if the first one is right but try this.

6 0
3 years ago
Other questions:
  • How many times is the function wordScramble() called in the given program? public class WordScramble { public static void wordSc
    6·1 answer
  • Which of these is a typographical clue?
    9·2 answers
  • _ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
    10·1 answer
  • Using the expected format, of putting key information where the reader can’t find it, is an example of?
    8·2 answers
  • . Network navigation devices, such as routers, help datatravel in bundles that are referred toas………..
    14·1 answer
  • Will give brainliest!!!!!!!!!!!!
    6·2 answers
  • Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to
    11·1 answer
  • If your laptop is not able to connect to your wireless network, which of the following might be a likely cause of the problem?
    11·2 answers
  • Complete each sentence to describe different elements of an Excel worksheet.
    11·2 answers
  • ________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!