1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
3 years ago
13

What is the most important thing you should avoid when you store files and folders?

Computers and Technology
1 answer:
iVinArrow [24]3 years ago
4 0
Getting hacked by someone
You might be interested in
1:A presentation program which is developed by Microsoft
LekaFEV [45]
Option 3: PowerPoint.
4 0
3 years ago
Read 2 more answers
Floating point values (real numbers that can handle up to 5 decimals)
Ann [662]

Answer:

1.45638

Explanation:

p please mark me as brainlest

4 0
3 years ago
How can anger cause workplace accidents?
Umnica [9.8K]
I think the corect answer is c
8 0
3 years ago
Read 2 more answers
Which of the following is not included in the Christian Bible?
zmey [24]
The answer is C because the Quran is the Islamic Bible or book of religious beliefs.
8 0
3 years ago
Joanna accidentally leaned on her keyboard and repeatedly typed the letter z. How can she fix this mistake?
Brut [27]

Answer:

just press delete

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • In five to ten sentences, explain what netiquette is and how it improves efficiency and productivity in the workplace.
    10·2 answers
  • The cord of a bow string drill was used for
    14·1 answer
  • What are the three fundamental principals of mnemonics? <br><br>HELP FASTTT!
    15·1 answer
  • In terms of object-oriented programming, after a class is defined,
    11·1 answer
  • THIS IS PYTHON QUESTION
    11·1 answer
  • How to change color of object in photoshop?
    10·2 answers
  • Which of these is system software? Check all
    14·1 answer
  • Hello i need help whats -5 = 500
    13·2 answers
  • Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party
    12·1 answer
  • the application you attempted to authenticate to is not authorized to use cas. contact your cas administrator to learn how you m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!