Keputusan bersama dilakukan dengan cara

Answers

Answer 1
Answer: Keputusan bersama dengan cara voting

Related Questions

What is the basis function of a galvanometerA the transformation of mechanical to electrical B the change in strength of a magnetic field C movement caused by a change in temp D rotation of a wire loop in a magnetic field
The general who directed the project responsible for the "Fat Man” graduated from what alma mater in 1918?
Answer ASAP and I'll give brainliest.
1.What are some examples of cyber crime?2. What is a computer virus? 3. What are some ways a computer can get a virus? 4. What are some things you can do to be safe on the internet?
Define and test a function myRange. This function should behave like Python’s standard range function, with the required and optional arguments, but should return a list.Do not use the range function in your implementation!Hints:Study Python’s help on range to determine the names, positions, and what to do with your function’s parameters.Use a default value of None for the two optional parameters. If these parameters both equal None, then the function has been called with just the stop value. If just the third parameter equals None, then the function has been called with a start value as well. Thus, the first part of the function’s code establishes what the values of the parameters are or should be. The rest of the code uses those values to build a list by counting up or down.

What is the chief concern of cloud computing?

Answers

Answer:

Security is the chief concern of cloud computing

Explanation:

The phrase cloud computing refers to a type of Internet-based computing, in which different services including storage, servers, and applications are delivered to the devices and computers of an organizations through the Internet.

The main concerns of cloud computing include;

Cost

Security

Speed

Redundancy

Among these, Security is the chief concern of cloud computing

Let us first understand what a cloud computing is? So what is cloud? A cloud is up in the sky? Who has access on it? Everyone in the world can see. Do you know which cloud is giving you rain?

No. The same is the concept of cloud computing. Any subscriber can save data. The user does not know where the data is stored and retrieved. After understand this you can easily understand the concern of cloud computing.

1. Cyber attacks  

2. Security breaches  

3. Intrusion of Government  

4. Legal liabilities  

5. High risk to store data

Here security is the chief concern of cloud computing.

What is the difference between a fiber optic cable and a twisted pair cable?

Answers

Answer:

Explanation:

Difference Between Twisted Pair and Fiber Optic Cable is that Twisted-pair cable consists of one or more twisted-pair wires bundled together. ... While the core of a fiber-optic cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.

hope this helps PLZ mark me brainliest

Fiber optic cables and twisted pair cables are both used for transmitting data, but they differ in terms of their construction, properties, and capabilities.

The key differences between the two

Transmission Medium:

Fiber Optic Cable: Fiber optic cables use thin strands of glass or plastic fibers to transmit data using light signals. These cables can transmit data over longer distances and at higher speeds compared to twisted pair cables.

Twisted Pair Cable: Twisted pair cables consist of pairs of insulated copper wires twisted together. They use electrical signals for data transmission.

Speed and Bandwidth:

Fiber Optic Cable: Fiber optics offer higher bandwidth and data transmission speeds. They can transmit data at speeds of several gigabits per second and are well-suited for high-speed internet, video streaming, and large data transfers.

Twisted Pair Cable: Twisted pair cables have lower bandwidth and are generally slower than fiber optics. They are suitable for slower data transmission needs, such as basic internet usage and voice communication.

Learn more about optic cable

brainly.com/question/30438493

#SPJ2

Cyber bullying is protected by Freedom of Speech

True or False

Answers

Answer: true sadly

Explanation:

Answer:

False

Explanation: It's actually an offense because it counts as discrimination, which is not protected under the Bill of Rights.

Is the hacker group project zorgo real or fake

Answers

the hacker group project zorgo is real

It is real I hoped this help you

Which evaluation factor will be most important when choosing technology for the company

Answers

Answer:  They are a lot of them

Explanation:

Getting to know the people not to personally

Be a Listener and Know when to shout

Use Wisdom before speaking and Knowledge

Encourage people some times in a month or week  

Which person is a Graphic Designer?

Answers

Answer:

A graphic designer is a professional within the graphic design and graphic arts industry who assembles together images, typography, or motion graphics to create a piece of design. A graphic designer creates the graphics primarily for published, printed, or electronic media, such as brochures and advertising. They are also sometimes responsible for typesetting, illustration, user interfaces. A core responsibility of the designer's job is to present information in a way that is both accessible and memorable.

Explanation: