1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
2 years ago
15

The question is provided in the image below.

Computers and Technology
1 answer:
Vladimir [108]2 years ago
3 0

Answer: b

Explanation:

You might be interested in
To keep your computer working efficiently, it is a good idea to _____ unnecessary files. delete defragment save archive
Korolek [52]

Hey the answer to this is delete or remove. because it is a good idea to remove old files that your not using.

Hope this helps

-scav

3 0
3 years ago
David was editing his audio recording in his audio editing software. He adjusted the vocal track of his audio toward
Dmitrij [34]

Answer:

b

Explanation:

balancing the sound

a                h    o

l                 e    u

a                      n

n                      d

c

i

n

g

6 0
2 years ago
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
Which type of data is presented on the y-axis?
den301095 [7]
For example, if I was foong a bar graph about the amounts of what was in different jars, the x-axis would have the items in the jars, and the y-axis woukd have the amount of items in the jars
6 0
3 years ago
Read 2 more answers
Which of the following is an example of Boolean operator?
Paraphin [41]

Answer:

BUT APEX Verified

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • ____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag
    5·2 answers
  • A new company starts up but does not have a lot of revenue for the first year. Installing anti-virus software for all the compan
    11·1 answer
  • What is one way you might code-switch when posting a comment to a class discussion?
    13·1 answer
  • In a batch operating system, three jobs are submitted for execution. Each job involves an I/O activity, CPU time and another I/O
    12·1 answer
  • Can Anybody Answer This For Me ?
    7·1 answer
  • 3. Which icon image is greater in file size? (Show your working) [2]
    8·1 answer
  • Question # 2 Multiple Choice The _____ method returns an integer between the two provided numbers. It can take the value of eith
    10·2 answers
  • Consider the following code segment
    15·1 answer
  • Core to resource management system is the _________that coordinates the server hardware.
    8·1 answer
  • what are the main technologies that have contributed to be growth and commercialization of the Internet
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!