1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
10

Data cannot be sorted of filtered accurately if there are ________.

Computers and Technology
2 answers:
blsea [12.9K]3 years ago
7 0
The answer is "C" "blank fields or records" I have this answer and it was right 
have a nice day......

ruslelena [56]3 years ago
5 0
<span>c. blank fields or records
</span>
You might be interested in
Complete the sentence.
Galina-37 [17]
The answer is number 2 accessible
5 0
3 years ago
Jerry can use an <br> program to restrict information from going out without his permission.
inysia [295]
The answer is predictions
7 0
3 years ago
Read 2 more answers
Trish has bought a new computer that she plans to start on after a week
7nadin3 [17]
So what is the question my guy?
6 0
3 years ago
What are some common security threats for our home devices and IoTs?
musickatia [10]

Answer:

  • Botnets. A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware.
  • A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests.
  • In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.
  • Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
  • Ransomware attacks have become one of the most notorious cyber threats. In this attack, a hacker uses malware to encrypt data that may be required for business operations. An attacker will decrypt critical data only after receiving a ransom.

Explanation:

6 0
3 years ago
USDA-APHIS Animal Care Resource Policy #12 "Considerations of Alternatives to Painful/Distressful Procedures" states that when a
katrin2010 [14]

Answer:

C. The specific field of study

C. change in anesthetic agent

Explanation:

In the consideration for the procedure, some information are required and examples are the strategy of the search/the database name. However, the area of study is not one of the information.

The animal use proposal can general be altered based on the type of change required. However, an anesthetic agent alteration is not a significant change.

6 0
3 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • The disk drive is a secondary storage device that stores data by _____ encoding it onto a spinning circular disk.
    14·1 answer
  • What is SAFFiR? (The robot)
    12·1 answer
  • Which of these is NOT a reason why you would print handouts of your presentation?
    14·1 answer
  • Why might you choose a Macintosh operating system rather than a Linux operating system?
    5·2 answers
  • Which of the following is NOT a useful strategy when making an informed purchase ?
    7·1 answer
  • Jeni is using the Label Wizard to solve a problem. What problem was she most likely experiencing?
    13·1 answer
  • 1 point
    13·1 answer
  • When scriptwriters are writing scripts, why do they have to write them in accordance with industry standards?
    9·1 answer
  • Which of the following Office Online apps is most effective for creating multi-media presentations?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!