1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
3 years ago
14

An example of an unaltered material used to create objects is

Computers and Technology
1 answer:
ehidna [41]3 years ago
3 0
<span>At mine site of Rijckholt in the Neatherlands, archaeologists ...

</span>
You might be interested in
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
1. During the first scene, Taylor's mother says "What you do online isn't exactly private." What do you think she meant by that?
tekilochka [14]

Answer:

The statement is "True".

Explanation:

Explanation of this statement can be given as:

  • Taylor's mother meant that the "universe is open to everything you do online, everyone can see". This statement true, because people will hack your profile unless you label these as personal, even re-post material that you have shared.  
  • In other words, we can say that a profile is placed on private in social media, it's not always free and your friend can use it, and they can share your personal information. It is difficult to uninstall once it is out there.  
5 0
3 years ago
Most wheel/tire assemblies are balanced using lead weights which should be removed and segregated from other metals
crimeas [40]
The answer is true. I took the test.
6 0
3 years ago
Read 2 more answers
OO<br>(A) 3 and 5<br>(B) 4 and 8<br>(C) 2 and 0<br>(D) 6 and 9<br>2. There are twelve books on a shelf and four children in a ro
dlinn [17]

Explanation:

2.there will be 8 books left on the shelf if each child takes one

8 0
2 years ago
The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
valina [46]

Answer:

yea that is correct hope this works

7 0
3 years ago
Other questions:
  • A tool that is used to search for and gather data from a page on the internet is called a ?
    11·2 answers
  • The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
    9·1 answer
  • If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the p
    13·1 answer
  • Why might your digital footprint be important when you are applying for collage
    13·1 answer
  • Which of the selections below is not a benefit of imaging the computers on your network? There are fewer licensing fees because
    11·1 answer
  • Michael a programmer, is writing an algorithm to solve programming problems, Guide him to write an algorithm
    8·2 answers
  • Translate the following pseudocode for randomly permuting the characters in a string into a C++ program.
    15·1 answer
  • Topic: Video Games.
    7·1 answer
  • The web design teams of a company are working on designing websites for various companies, Pick the ideas that employ proper use
    13·1 answer
  • Which of the following statements is true about the code used for software development?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!