1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
14

Which character must decide whether to support the assassins or avenge his friend's death?

Computers and Technology
2 answers:
nignag [31]3 years ago
4 0

Answer:ANTONY

Explanation:

Just took the test.

vovikov84 [41]3 years ago
3 0

Answer: Anthony

Explanation:

You might be interested in
Which asynchronous electronic community is also known as a forum?
Semmy [17]
What are the choices?
Message Boarding is the asynchronous electronic that is know as a forum.
3 0
4 years ago
Read 2 more answers
When replacing a system board in a laptop, which feature is a must?
Sphinxa [80]
I would use a dual core Becuase a quad can be too space consuming and it can overheat the computers software
6 0
3 years ago
Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile.
Aliun [14]

C. TRUST

Explanation:

7 0
3 years ago
Read 2 more answers
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Where you should go to find out what access the system and users to a file ​
dsp73

Answer:

To see who reads the file, open “Windows Event Viewer”, and navigate to “Windows Logs” → “Security”. There is a “Filter Current Log” option in the right pane to find the relevant events. If anyone opens the file, event ID 4656 and 4663 will be logged.

4 0
3 years ago
Other questions:
  • 10 facts about turbines
    11·2 answers
  • An office is facing a network issue. The technicians have determined that a virus affected the manager's computer. However, they
    15·1 answer
  • Design a program that asks the user to enter a store’s sales for each day of the week. The amounts should be stored in an array.
    10·1 answer
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • The relational database is the primary method for organizing and maintaining data today in information systems. It organizes dat
    9·1 answer
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • Big Project, Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly
    9·2 answers
  • In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used t
    11·1 answer
  • WILL GIVE BRAINLIEST! The command simplify is used if you only want the first two digits of a decimal to appear in the interpret
    13·1 answer
  • Describe a cellular network, its principle<br> components and how it works.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!