1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
15

Types of digital divide ​

Computers and Technology
1 answer:
ArbitrLikvidat [17]3 years ago
6 0

Explanation:

introduction. desktop computer,tablet computer,storage devices such as flash drivers, mobile phone...

You might be interested in
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
....................................................................................................
r-ruslan [8.4K]

Answer:

......................

..............

......

....

...

..

.

6 0
2 years ago
Jeremy is working with a team that is creating an application using attributes and associated methods. What type of programming
Ugo [173]
<span>object-oriented programming languages</span>
8 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
The function known as "Comments" can be displayed during a presentation<br>O True<br>False​
Sonja [21]

Answer:

false

Explanation:

Select the comment icon. on the slide. The Comments pane will open and you can see comments for that slide.

Select Reply to respond to a comment.

Select the Next or Back buttons to go between comments and slides.

3 0
4 years ago
Read 2 more answers
Other questions:
  • Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he
    12·2 answers
  • Can you help me correct a sentence?
    13·1 answer
  • How to do this? ICT Excel there's a screenshot attached
    6·1 answer
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    7·1 answer
  • Fill in the correct formula called a contains numbers from Rhodes 1 to 20 you can use the formula blank to find the volume of th
    14·1 answer
  • . Which of the following is NOT a valid declaration for a character string?
    6·1 answer
  • An analogue sensor has a bandwidth which extends from very low frequencies up to a maximum of 14.5 kHz. Using the Sampling Theor
    9·2 answers
  • What's the full form of CPU?​
    5·2 answers
  • You can resize a row in a table by dragging the ____.
    13·1 answer
  • Dynamics
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!