1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
2 years ago
6

Within the manufacturing industry, there are fourteen subindustries. Which of the

Computers and Technology
1 answer:
inna [77]2 years ago
3 0

Answer: A or B i done this before but my memorys quite blurry i rekon doing A

Explanation:

You might be interested in
Data in the form of digits is called
Flauer [41]
Numeric data because it consist of numbers
5 0
2 years ago
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
3 years ago
What is a PivotTable?
professor190 [17]

Answer:

d

Explanation:

6 0
3 years ago
Read 2 more answers
ASAP PLZ!!!!!! Select the correct answer from each drop-down menu. Complete the sentences related to the types of sample data. I
Anit [1.1K]

Answer:

Data mining is one of the activities in Data Analysis. ... On the other hand, Data Analysis tests a given hypothesis. While Data mining is based on Mathematical and scientific methods to identify patterns or trends, Data Analysis uses business intelligence and analytics models.

Explanation:

8 0
3 years ago
A section at The top of the page that makes it easy for a recipient to respond to a letter is called an
Vesna [10]

its a  return address

8 0
3 years ago
Read 2 more answers
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • Which translator program reads small portions of a program at a time, translating them into machine instructions which are then
    12·1 answer
  • A.<br> Post-It note<br> b.<br> notebook<br> c.<br> tutor<br> d.<br> spell check
    14·1 answer
  • A technician replaces a defective 250GB hard drive in a desktop with a 2TB hard drive. After installation, the computer detects
    5·1 answer
  • Grbn kmjnhbgvfcdxswikmjnthbrvgt
    5·2 answers
  • In addition to ranking the relevance of a particular site according to the keywords entered by the user, which of the following
    10·1 answer
  • Your classmate is frustrated because the code that was designed to add up her five quiz grades is not working properly.
    12·1 answer
  • Select the correct answer from each drop-down menu
    7·1 answer
  • 2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
    12·1 answer
  • Put simply, what tasks do algorithms help computers perform?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!