1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
10

What is a task that an internet database allows you to perform? storing your software backing up your files sorting information

based on certain criteria cleaning your hard drive?
Computers and Technology
2 answers:
lakkis [162]3 years ago
4 0
Answer : Sorting information based on certain criteria.
Marina86 [1]3 years ago
3 0

Sorting information based on certain criteria.

You might be interested in
Which tool can be used to increase the space between a bullet point or a number and text?
Elis [28]

Answer:

D, hanging indent marker

Explanation:

6 0
3 years ago
Read 2 more answers
________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
Norma-Jean [14]

Answer:

Hi there it is A vulnerability

Explanation:

4 0
2 years ago
Case Study/Scenario: First, Julio clicks Tools from the Chrome menu on the toolbar. Next, he looks for Manage Add-Ons but can no
Margarita [4]

Answer:

Follows are the solution to this question:

Explanation:

Throughout this scenario, Julio chooses the wrong way to handle the add-ons, instead, he opens the option to search and then type add-ons, where the manager can search for add-ons. It is a software extension that provides an application of additional features. It can broaden certain features, introduce additional features to just the interface surface, or provide extra capabilities for both the system.

4 0
3 years ago
(I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
Nastasia [14]

Answer:

right clicking should be your answer

3 0
3 years ago
Which type of password would be considered secure?
Annette [7]
A strong password obeys some password rules, such as:
- minimum length
- using characters from different classes (uppercase, lowercase, numbers, typographic characters)

Your safest bet these days is to use a password manager and have it generate one for you, so that hackers can not guess it by understanding humans' predictable mind. ;-)
6 0
3 years ago
Other questions:
  • ACCOUNTING
    13·2 answers
  • Susan will be configuring a snort network ids sensor to monitor her subnetwork. she will be using a web-based console interface
    8·1 answer
  • For some brand-name computers, the hard drive contains a partition that can be used to reinstall windows. what is the name for t
    6·1 answer
  • Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
    5·1 answer
  • Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the
    11·1 answer
  • Synapse is not working and is crashing every time you attach it. What should you do?
    13·1 answer
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
  • A specialized output device for producing charts, maps, and very high-quality drawings is
    5·1 answer
  • Which type of relationship is responsible for teaching you values and how to communicate?
    9·1 answer
  • How has 5G become more energy efficient?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!