1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
2 years ago
13

The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.

Computers and Technology
1 answer:
ikadub [295]2 years ago
4 0

Answer:

archive

Explanation:

the archive process retains copies of data over extended periods of tike in order to meet legsl ane operational requirements

You might be interested in
The undo function allows the user to cancel up to _____ previous typing actions.
GalinKa [24]
C 20 previous typing actions
4 0
3 years ago
What is one current method of detecting planets orbiting around other stars?
Gnoma [55]
C

D is the old way.

A they have not done yet

B not even a thing
5 0
3 years ago
List some of the CSS and HTML code that is confusing to you. List at least three CSS attributes and three HTML tags.
svet-max [94.6K]

Answer:

HTML Tags: <input/>, <canvas></canvas>, <div></div>

CSS Attributes: padding, font-family, margin

Explanation:

5 0
3 years ago
Read 2 more answers
_____ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.
kap26 [50]

Answer:

"Social engineering" is the correct answer for the above question.

Explanation:

  • Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
  • It is used to read the humans data or psychologically hack human data.
  • It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
  • The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.

6 0
3 years ago
Janis needs to select all the text in a single bullet point. Which action describes the easiest method to perform this task?
olganol [36]

Answer:

Triple-click the text in the bullet item is the easiest  way to select all text

Explanation:

5 0
3 years ago
Other questions:
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • Why would you convert your birth year to binary numbers?
    6·1 answer
  • A _______ object is used for storing data.
    9·2 answers
  • 1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (
    12·1 answer
  • What is the analysis stage in System development life cycle?
    12·1 answer
  • When pointed over a text within a paragraph, the cursor takes the shape of a/an
    10·1 answer
  • What is a tax exemption (also known as a tax allowance)?
    13·1 answer
  • Why is know app downloading in my android phone even if I have 900 MB ???
    8·2 answers
  • I need help with coding in python!
    9·1 answer
  • Which item was key to how Microsoft got its start in the 1970s? a. artificial intelligence b. vacuum tubes c. Altair 8800 d. UNI
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!