1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
5

Escribe 10 ejemplos de lo que consideras un byte

Computers and Technology
1 answer:
stira [4]3 years ago
4 0

<u>Respuesta:</u>

Espero y te pueda ayudar: ).

You might be interested in
Most airlines use very modern hardware and software.<br><br><br> True<br><br> False
torisob [31]
True definitely. They have to use very modern tech in order to make people trust and use them.
3 0
4 years ago
A built in mathematical formulae used to perform calculation _______​
zubka84 [21]

Answer:

o enter an Excel formula into a cell, you start with an equal (=) sign. Excel then knows that the expression that follows should be interpreted as a calculation, not text. After the equal sign, you enter the formula. For example, you can find the sum of the numbers in cells C2 and C3 by using the formula =C2+C3.

Explanation:

hope that helps you

6 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Discuss the OSI Layer protocols application in Mobile Computing
Oduvanchick [21]

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

7 0
3 years ago
Why is primary storage important
zepelin [54]

Answer:

What is primary storage?

A primary storage device is a medium that holds a memory for short periods of time while a computer is running. Although it has a much lower access time and faster performance, it is also about two orders of magnitude more costly than secondary storage.

A primary storage device may also be referred to as internal memory, main memory, main storage, and primary memory.

Why is primary storage important?

Primary storage provides fast access to the CPU, which allows active programs to deliver optimal performance to the end-user. Speed and usefulness aside, the fact that the loss of power means the loss of data makes RAM a short-term storage solution. In fact, it’s lack of long-term viability is the reason it makes sense to save your progress when working in one program or another.

3 0
3 years ago
Other questions:
  • What is the portion of the PowerPoint window that contains the current slide, total slides, zoom options, and various shortcuts
    8·1 answer
  • The first step in creating photographs with good backgrounds is which of the following? Learning to see the background before ta
    11·2 answers
  • This toolbar has icons representing the application's basic operations such as Save and Copy. Drawing Formatting Standard Task
    11·2 answers
  • Data arranged and stored in a data set
    9·1 answer
  • Let's say that you're the sole IT person in your company, and your boss wants a way to block certain websites from employees. Wh
    6·2 answers
  • How many of you got the right answer from this app​
    8·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • Reverse Word Order: Write a program that reverses the order of the words in a given sentence. This program requires reversing th
    15·1 answer
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    14·1 answer
  • Consider legal issues and intellectual property concerns when creating computer programs?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!