1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
11

The Internet is a worldwide communications network. Which device connects computer networks and computer facilities?

Computers and Technology
1 answer:
ELEN [110]3 years ago
8 0

Answer:

Servers.

Explanation:

Server centers are what hosts and connects many different networks and devices around the globe, not to mention connects other server centers.

You might be interested in
Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
N76 [4]

Answer:

Actions that Bobbi should take to identify opportunities for online business growth are:

Review competitor websites

Identify a USP

Build a SWOT analysis

Explanation:

The first thing Bobbi should do is to review competitor website.

This will give her information about her competitors the products that they offer, the price of their products, the website layout and structure of the competitors, any strategy they are using to boost their online product sale  such as by offering product promotion, discounted price etc.  

After reviewing competitor websites, next thing that Bobbi should do is  identify a Unique Selling Proposition. Bobbi should identify the unique features, benefits of her products that induce her business to stand out from the competitors. Identify all those unique aspects and factors that make her product different from others.

After identifying USP, Bobbi should now build a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis. This way she will be able to  recognize and understand her website's strengths, distinctive competencies, limitations, opportunities and risks. This will help her to analyse the overall strategic position of her website as well as her business. That will help her create a strategy for the future.

8 0
4 years ago
When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo
exis [7]

The available options are:

Emails

Financial spreadsheets

User downloads

Databases

Answer:

User downloads

Explanation:

The correct answer is User downloads, this is because, the downloaded files are in cloud or another website memory or database, which serves as an alternative backup already. Thus, those downloaded files can still be recovered at later time when one needs to get the files back.

However, Emails, Financial spreadsheets and Databases, do not have any other place to retrieve them, because they are originally created and are yet to be uploaded to cloud or another website memory space to serves as alternative back up.

4 0
4 years ago
Which address correctly represents one that is composed of two halves, one assigned to a network adapter manufacturer, and the o
Vlad1618 [11]
 Media access control address
5 0
3 years ago
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
vagabundo [1.1K]

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

6 0
3 years ago
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
Artemon [7]

Answer:

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Explanation:

6 0
3 years ago
Other questions:
  • To remove an embedded chart, you should _____ it and press the DELETE key.
    14·2 answers
  • Checking tire pressure should be performed:
    11·2 answers
  • Write a script which: Uses the input function to get any number and store it in a variable named my_number Create a new variable
    8·1 answer
  • Can someone tell me a user to an admin on brainly I got a person sending "inappropriate pictures" all over brainly
    13·1 answer
  • If you want Nud3s add me on sc Kermit4lyfe1
    11·2 answers
  • Implement a program that manages shapes. Implement a class named Shape with a method area() which returns the double value 0.0.
    15·1 answer
  • What is it called when servers on the Internet supply applications as a service, rather than a product
    14·1 answer
  • Computer programming 5
    10·1 answer
  • 20 POINTS! Which music making software is better? Ableton Live or Logic Pro? Name the advantages and disadvantages of each one!
    7·2 answers
  • Which button on a desktop computer begins a reboot of the computer without power being removed from the computer's components?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!