1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
14

After a webcast is completed there are no files left on your computer.

Computers and Technology
1 answer:
astra-53 [7]3 years ago
7 0
What are you askinggggggggggg

You might be interested in
A _______________ is a field that contains data unique to a record.
Andru [333]

A primary key is a field that contains data unique to a record

8 0
3 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
3 years ago
When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at C
Svetllana [295]

Answer:

c.

Explanation:

People trust open-source software - if they can see how it works and understand it, they can help improve it and build applications using it. If these protocols were not publicly available - then nobody would have implemented services using them - so nobody would be adopting it.

8 0
3 years ago
Analyze a software application that enables people to purchase prescription drugs on the internet. briefly describe this applica
stiv31 [10]
This question makes no sense
8 0
3 years ago
Which of the following are some popular debugging techniques?
topjm [15]

Answer:

a fix any syntax bugs. I looked it up on the internet so you should be good good luck on your test

8 0
3 years ago
Other questions:
  • 4. When you're working with a word processing document and you press the Del key, what happens?
    8·2 answers
  • When you _____ a workbook, you control the ability users have to make changes to the file?
    15·1 answer
  • What does <3 mean at the end of a message?
    9·1 answer
  • Which of the following should NOT be done to keep people from slipping on floors? A) Have the proper absorbents in an easy-to-fi
    12·2 answers
  • Beneficios del reciclaje electrónico
    6·1 answer
  • Nj hj hjkbh hj g7yubuyiycrtdryfrrcctcftt
    12·2 answers
  • If i keep giving out brainlyest will i get banned again?
    12·2 answers
  • What method of thermal energy is at work when heat lamps are used to warm up baby chickens?
    11·2 answers
  • Enzo is writing a paper about the similarities and differences between ancient Rome and modern America. Which text structure is
    9·2 answers
  • How to enhance the video to full screen in filmora
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!