what is the function of the pound key​

Answers

Answer 1

Answer:

To allow for access to telephone based computer systems


Related Questions

3 3) Write a program to convert distance from kilometer to miles​

Answers

Answer:

In this example, we will show you how to write a java program to convert kilometers to miles. The program gets the kilometer value from the user and store it in the variable. Then it is dividing the kilometer value by 1.609344 which will give the values in terms of miles.

Explanation:

Wendell notices that the company's top executives share a belief that managers are directly responsible for the organization's success or failure. This belief reflects a(n) ________ view of management.
A) traditional.
B) omnipotent.
C) reflective.
D) symbolic.

Answers

This belief reflects an omnipotent view of management.

A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for sorting the data to send email and web pages to the appropriate location?
a) Transport
b) Network
c) Data link
d) Application

Answers

Answer:

This is the second question like this I've seen. They aren't the greatest.

Explanation:

The question is not good. The answer would be option a, Transport even though it doesn't make a whole lot of sense when you really go into detail.

It could also be option d, Application but I think they're going for the first.

How would you explain how a password generator program works

Answers

Answer:

A random password generator is a software program or hardware device that takes input from a random or pseudo-random number generator and automatically generates a password. Random passwords can be generated manually, using simple sources of randomness such as dice or coins, or they can be generated using a computer.

What is the name of the process that basically takes a snapshot of the current security of an organization

Answers

The name of the process that takes a snapshot of the present security of an organization is refereed to as: Vulnerability assessment.

What is Vulnerability Assessment?

Vulnerability assessment can be defined as the process whereby risk and vulnerability of computer networks, systems, applications or other part of an IT ecosystem is identified.

Vulnerability assessment, as an important component of vulnerability management, involves providing security teams and stakeholders with necessary information that can aid analysis and prioritizing of risk for proper remediation.

Therefore, the name of the process that takes a snapshot of the present security of an organization is refereed to as: Vulnerability assessment.

Learn more about Vulnerability assessment on:

https://brainly.com/question/25633298

Other Questions
How are the nucleotides in dna different from those found in rna?. The points given in each table lie on a line. Find the slope of the line. Then graph the line Write the expression below in its simplest form.(3d+5)+(d-2) Please help me i will give brainliest if it shows up; Luisa, camina con ________, come con los dientes y escribe con las manos. (1 point)A.los hombrosB.las naricesC.las bocasD.los pies Crime scene investigator Calvin Miller finds a firearm left at a scene. He takes an evidence collection box, picks up the gun by sticking his pen in the barrel, deposited it into the box, and seals it for delivery to the lab. He then sees three bullets lodged into the wall. He takes a set of tweezers and pulls out each bullet, until it is free from the wall, and then places them together in a small paper bag to be sent to the lab. What, if anything, did he do wrong in the collection process? Arrange the numbers in decreasing order.76.34276.33276.23276.343 why do people not want to talk about their mental health? ajutor pls dau coroana What 8 letter word can have taken away and it still make a word .Take another letter away and it still make a word .Keep on doing that until you have one letter Left What is the word? Which of the following is the graph of y = X + 4 20x + 6 What is the constant? If a media company wants information on consumers' television viewing habits, it can purchase reports compiled by commercial research firms such as Nielsen. This is an example of ______ data. what musical element helps mark the end of the second b section bringing the form to a close The water pipe of a house was leaking gallons of water per minute. What is the constant rate of water that is lost per minute according to the graph? Written as a rate, 100 miles in 5 hours would be ____ miles per hour. The ph of a particular solution is given by mc031-1. Jpg, where x represents the concentration of the hydrogen ions in the solution, in moles per liter. Which graph models the ph of this solution?. Help plsss!?!?!??!?!??>................................... Which populations of species will be most likely to survive when environmental conditions shift?. Which strategy would help you save the most money? 10. Which of the following was a major reason for the Reformation?A European merchants resented paying taxes to the Church in Rome.B. The Church was threatening to excommunicate the king of France.C. The pope in Rome insisted on speaking only Latin.D. Martin Luther said he could interpret the Bible better than the pope.