1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
9

Effective note-taking helps support action. distinction. distraction. retention.

Computers and Technology
2 answers:
zloy xaker [14]3 years ago
7 0
It is the last one retention because writing it out will cause it to stick in your brain better
raketka [301]3 years ago
4 0

Answer:

retention

Explanation:

You might be interested in
If consumers start to believe they need a product, what is likely to happen
makvit [3.9K]
B I believ not sure tho
8 0
2 years ago
Explain possible consequences if someone is issued with a fraudulent licence
Anna35 [415]
Having a fake license results in a criminal charge and will affect your future if wanting to work in school. some of the charges will be lagre fines and points of your license.

7 0
3 years ago
If you have questions about taxes, where can you go to get answers?
Andrews [41]

Answer:

Explanation:

i was told to paste this to other comment sections sooo...HEY PLS DON'T JOIN THE ZOOM CALL OF A PERSON WHO'S ID IS 825 338 1513 (I'M NOT SAYING THE PASSWORD) HE IS A CHILD PREDATOR AND A PERV. HE HAS LOTS OF ACCOUNTS ON BRAINLY BUT HIS ZOOM NAME IS MYSTERIOUS MEN.. HE ASKS FOR GIRLS TO SHOW THEIR BODIES AND -------- PLEASE REPORT HIM IF YOU SEE A QUESTION LIKE THAT. WE NEED TO TAKE HIM DOWN!!! PLS COPY AND PASTE THIS TO OTHER COMMENT SECTIONS

4 0
3 years ago
Which of the following was not important in the development of the internet?
lesantik [10]
D. Rise of NASA.Hope I helped.
8 0
3 years ago
Read 2 more answers
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Other questions:
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • The material chosen for your study group
    11·1 answer
  • How do solar cells translate heat energy into mechanical energy
    13·1 answer
  • Add is a function that accepts two int parameters and returns their sum.
    8·1 answer
  • Which piece of computer hardware was revised to run hypervisors natively?
    12·2 answers
  • What is SoC? how is it different from CPU?
    14·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • Picking up sound over a great distance while making it seem to come from close up.
    11·1 answer
  • What is computer give definition ​
    14·2 answers
  • Can you help me with my homework what should i do
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!