1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
2 years ago
9

Differences between mechanical and electromechanical device .two pointsplz ​

Computers and Technology
1 answer:
Ivan2 years ago
3 0

hich group most threatened the Byzantine Empire in 1050?

Ottoman Turks

Muslim Arabs

Latin Christians

Orthodox Christians

You might be interested in
When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit,
zysi [14]

Answer:

2. testing cybersquatting

Explanation:

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. In this case, phishing domain refer to a domain that is not a trustworthy one but try to deceive user into using it in place of the genuine domain.

Cybersquatting also known as domain squatting is registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses.

Identity theft is the illegal use of someone else's personal information in order to obtain money or credit. It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

From the above definition, it is seen that someone registering a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit is called testing cybersquatting.

3 0
3 years ago
Read 2 more answers
I would A lot of knowledge and education for computers and <br> Technology
borishaifa [10]

Answer:

Pay attention in your class.

Explanation:

If you paid attention in your class, you would have at least a basic understanding of the material.

7 0
2 years ago
Read 2 more answers
Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
8090 [49]

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

3 0
3 years ago
In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
spayn [35]
Hello <span>August1859 
</span>
Answer: In a database, a key field is used to uniquely identify each record for retrieval or manipulation.

Hope This Helps!
-Chris
8 0
3 years ago
IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Ne
anzhelika [568]

Answer:

Following are the answer to this question.

Explanation:

It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.

3 0
3 years ago
Other questions:
  • You want to plug a keyboard into the back of a computer. you know that you need to plug the keyboard cable into a ps/2 port. whi
    9·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • A provides legal protection for something an individual has created
    12·1 answer
  • What is the Slide Sorter View used for?
    12·2 answers
  • After fixing the format of her subheadings, she notices that she misspelled the name of one of the famous people
    7·2 answers
  • Scenario
    7·1 answer
  • What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
    14·1 answer
  • 3.6 Code Practice Edhesive. (PYTHON LANGUAGE)
    13·1 answer
  • Please help with coding assignment.
    11·1 answer
  • Need help ASAP.<br> I am so lost.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!