1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
15

Emma has decided that she needs to assess the risk and return of buying an extended warranty for her new laptop for school

Computers and Technology
1 answer:
vazorg [7]3 years ago
4 0

Answer:

then she should buy the one that can last long cause if she buy the one that is bad that could also be assets the risks to buying an extended warrantly for her new laptop for school

You might be interested in
The main technology for setting up a wireless local area network is​
julsineya [31]

Answer:

llllllffl

Explanation:

nnñbh hi Luigi

6 0
3 years ago
PLEASE HELP ME!!!!!
gizmo_the_mogwai [7]

Answer:

Unicode

Explanation:

This is a fairly large code and Is well known throughout my family since we study ancient codex and modern codes to solve crimes and find relics of the past, although our research has proven good and unicode is one that is being studied currently now, I have found it as long and very time consuming. Although ASCII is a computer code that consists of graphs and numbers it actually shortens the text. and hexadecimal has been proven to be less reliable and binary is a short code with little symbols

8 0
3 years ago
Read 2 more answers
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
2 years ago
You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
Artyom0805 [142]
It really depends on what you doing GUI is best for high graphics output
6 0
3 years ago
Read 2 more answers
Can someone give me a song I can make a dance too not a school related question
erastova [34]

try an anime song and move around like a noodle, no im just kidding try shawn mendes he has rlly good songs

5 0
2 years ago
Read 2 more answers
Other questions:
  • What is an example of asynchronous communication
    7·1 answer
  • What does an approved project summary document indicate?
    13·1 answer
  • When paying bills online, a payee is:
    9·1 answer
  • Please conduct some research and find an article on Security Threats and please provide link of the article.
    5·1 answer
  • Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
    13·1 answer
  • The process of combining rows and columns in a table is called _____.
    8·1 answer
  • What is the iterative procedure of recursive and nonrecursive?
    10·1 answer
  • What is the code for this please?​
    13·1 answer
  • What caused accident? into passive voice​
    13·1 answer
  • Write a program that prompts the user for two numbers then outputs the result of dividing the first number by the second number
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!