1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
2 years ago
7

Which type of chart is preferable when you are dealing with a timeframe?

Computers and Technology
1 answer:
ANTONII [103]2 years ago
7 0

Answer:

Pie chart

Explanation:

Just get to know

You might be interested in
__________ are the first line of defense against unsafe drivers.
vova2212 [387]
Peace officers are the first line of defense against unsafe drivers. These officers are appointed for a specific purpose of upholding law and order, so they would be the ones who are there to help you in case of an accident caused by unsafe drivers. A peace officers is just another term for a law enforcement officer, or just the police.
5 0
3 years ago
If you were setting up a network with 100 nodes and you wanted no more than 25 nodes per segment: what devices and connections w
STatiana [176]

Since at present number user or nodes in an organization counts is 100 and it can be further extended. Moreover concurrent at presented is 25 nodes is active.

<u>Explanation:</u>

So as best practice network administrator has keep in mind and select hardware application.

1. Server with high end rams and further extendable.

2. Minimum life of hardware such as routers, switch or managed or firewall should be considered or two years. But to technology improvement it is possible for 1 year only

3. Upgradable hardware appliances and software updates should be possible with mini cost effect.

4. Network security   and update or upgradable workstation or desktop or laptop to be consideration.

5. Functional operation of an organization should run smoothly.

8 0
3 years ago
What is a social media networks
Mumz [18]

You mean social networking? If so, Social networking is the use of Internet-based websites to stay connected with friends/family/anyone really. Social networking can have a social purpose, a business purpose, or both, through various websites. Hope this helps!! :)

4 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Tuklasin<br>awain 2: Grapiko ng Pananagutan<br>Isulat sa graphic organizer pa​
mrs_skeptik [129]
What are you saying????
7 0
3 years ago
Other questions:
  • Which of the following is the largest disadvantage of hydropower?
    8·2 answers
  • You want to place a video from the internet to your desktop. what process do you use?
    15·1 answer
  • After an informative session, you find yourself with several pages of notes. For maximum retention and understanding, you should
    6·1 answer
  • ........ is a formal description of message formats and the rules for exchanging those messages
    12·1 answer
  • The field names in a database are also known as__?
    12·2 answers
  • What do we call the software program that handles the communication between a peripheral device and your computer?
    8·2 answers
  • Now that you have explored several different languages (Python, HTML, CSS, and JavaScript), what can you do to keep straight whi
    7·1 answer
  • Where is the element coded in a web page.
    13·1 answer
  • Business use a fax cover sheet is to
    12·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!