1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
5

What is the answer ????​

Computers and Technology
1 answer:
gtnhenbr [62]3 years ago
8 0

Answer:

<h2>iv. NINGUNO DE LOS ANTERIORES</h2>

Explanation:

<h2>Hola</h2>
You might be interested in
A search for reliable information is a search for what?
Nadusha1986 [10]

Answer:

For information you can trust

Explanation:

8 0
3 years ago
Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you ar
WARRIOR [948]

Answer:

1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks

2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.

3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.

4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.

5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.

6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.

7 0
1 year ago
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ s
77julia77 [94]

Answer:

Cloud

Explanation:

Cloud computing is a central form of storing data on a data center, provided online, to provides inexpensive and secure storage facilities and central accessing of document, using any device and accessing the data from anywhere and time.

Data stored in a clients computer system, would have to be transferred to another remote computer by using a portable storage, to share data. Using a cloud service or a database center service, a document can be accessed by a group of users at the same time, in different places, and assures a secure data in the database.

3 0
3 years ago
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
IRINA_888 [86]

Answer:

The correct answer to the following question will be "Access".

Explanation:

  • Registered users have legal access to a network, while hackers may access a system illegally. The capacity is controlled by access controls. Access is defined as the right of a subject or object to use, manipulate, modify, or influence another subject or object.
  • Access control was the selective limitation of access to a location or other property while the mechanism is represented by access management. Access act may mean use, entry, or use. Permission is called authorization to access a resource.

Therefore, Access is the right answer.

5 0
3 years ago
Give two examples of safe, professional usernames. (1-2 sentences)
erastovalidia [21]

Answer:

Safe username

Explanation:

OKNGR$#1133

PLMOKNG^&*89

5 0
2 years ago
Other questions:
  • Add the following functions to the code:
    9·1 answer
  • Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c
    11·1 answer
  • Which category of app does word processing software fall into? A. Productivity B. Entertainment C. Social networking D. Educatio
    14·2 answers
  • It is generally safe to provide your social security number to
    7·2 answers
  • Careers in information technology deal with
    12·2 answers
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • Which of the following browsers was introduced with windows 10?
    10·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • 3.1.1 What type of goods are car radio and remote control.​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!