1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gogolik [260]
2 years ago
8

Explain in detail what it means to synchronize computers and mobile devices and include at least two strategies for keeping your

files in sync in your answers
Computers and Technology
1 answer:
olya-2409 [2.1K]2 years ago
7 0

Answer:

Explanation:

To synchronize computers and mobile devices means to use a cloud service that constantly checks to see if local files are up-to-date with the files in the cloud. These services update the cloud files with the local files if they are overwritten for maximum convenience.

Two strategies for keeping files in sync are using Dropbox. Another way is using iCloud if one has Mac/iOS devices.

You might be interested in
In a network, servers receive requests from which of the following?
Margarita [4]

Answer: routers, which direct the data to the correct destination.

Explanation:

In a network, servers receive requests from the routers, which direct the data to the correct destination.

The router simply refers to the networking device which helps in the forwarding of data packets between the computer networks. When a data packet is sent through one of the lines, then the information regarding the network address will be read by the router which will help it in determining the destination.

5 0
3 years ago
Read 2 more answers
(Technical terms) The classification computer into five distinct phases.​
vladimir2022 [97]

Answer:

Computing is any goal-oriented activity requiring, benefiting from, or creating computers. It includes development of both hardware and software. Computing has become a critical, integral component of modern industrial technology. Major computing disciplines include computer engineering, computer science, cybersecurity, data science, information systems, information technology and software engineering

<em>《</em><em>please</em><em> </em><em>mark</em><em> </em><em>as</em><em> </em><em>brainlist</em><em>》</em>

4 0
3 years ago
Assuming outFile is a file stream object and number is a variable, which statement writes the contents of number to the file ass
professor190 [17]

Answer:

Its outfile<<number.

However, before this we need to write

outfile.open("xyz.txt", ios;;out)

outfile<<number

And this code will do what is required in the question. This is going to write the number's content to the xyz.txt file which is the file associated with the outfile.

And remember this is in C++. And C++ is a imperative oriented programming language. Undoubtedly, Python and R are fully object oriented programming languages.

Explanation:

The answer is self explanatory.

7 0
3 years ago
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
3 years ago
What is the best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried
Wittaler [7]

Answer

The best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried out on company-owned digital assets:-<u>A well-defined published policy that clearly states that an employer has the right to examine, inspect or access company-owned assets.</u>

3 0
3 years ago
Other questions:
  • Help please?
    10·1 answer
  • What xDSL version provides a maximum throughput of 24 Mbps downstream and 3.3 Mbps upstream?
    9·1 answer
  • Write a function that accepts an integer parameter and returns its integer square root (if it exists). The function should throw
    12·2 answers
  • Describe the best way to deal with a difficult co-worker?
    13·2 answers
  • Write a function called printBackwards() that will work with a C string. The function will print any C string backwards. You don
    13·1 answer
  • Write a program "addnumbers.c" where it takes as many arguments as the user includes as command line arguments and calculates th
    11·1 answer
  • Which text features does this section contain? Check all that apply.
    15·1 answer
  • Which of the following should you consider when choosing a file format?
    9·2 answers
  • Which factors are involved in search engine optimization​
    10·1 answer
  • Write a program to output 3 lines of text with the following information:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!