1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
4 years ago
6

How do you utilize applications in your everyday life?

Computers and Technology
1 answer:
andreyandreev [35.5K]4 years ago
8 0
Knowing Microsoft Office is a plus because it pretty much is the standard when it comes to office suite. Also, know Microsoft office is known as a transferable skill which many employers look for.
You might be interested in
What does it NOT mean for something to be open source?
Readme [11.4K]

Answer:

Free to use but you have to pay a fee to modify

Explanation:

You NEVER have to pay for OPEN SOURCE

5 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati
nydimaria [60]

Answer:

Joint Application Development (JAD)

Explanation:

Joint Application Development is a method of application development that  lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.

3 0
3 years ago
Give an explanation of one network connection (it will every helpful​
charle [14.2K]

Answer:

WiFi, Ethernet, Broadband, Dial-up. Any of those.

Explanation:

Network connections are all different. Those listed are some of the many examples of network connections.

7 0
3 years ago
Hayden If you are on that really was not cool dont tell other people to break up with me I want to run away should I
mojhsa [17]

Answer: Yeah.

Explanation: Dude not funny.

5 0
3 years ago
Other questions:
  • As they relate to databases, which of the following describes forms? A. Forms are specified conditions used for retrieving recor
    12·2 answers
  • The specific term for expediting the delivery of software by breaking a task into smaller increments is called
    12·1 answer
  • An increase in the Money Supply will increase the Aggregate Price Level and will also increase which of the following?
    14·1 answer
  • What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?
    7·1 answer
  • Which type of word processing programs enables us to include illustrations within the program?
    6·1 answer
  • What's the name of all kind of money around the world
    5·2 answers
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • Where will the append() function add a new element to a list? A. At the end of the list B. At the beginning of the list C. In th
    10·1 answer
  • Please!! I need help, this is due by tonight!!!
    11·1 answer
  • It is a part of webpage that contains the logo ang branding of the web page​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!