1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
6

A study guide can be created

Computers and Technology
2 answers:
choli [55]3 years ago
7 0

Answer:

C, Both of these.

Explanation:

You can take notes either way. It's just your preference. Hope this helps :)

Leya [2.2K]3 years ago
6 0
The correct answer is c
You might be interested in
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
100 POINTS + BRAINLYEST FOR FIRST PERSON THAT GETS IT RIGHT!!!! While writing a formula, what are some ways to insert a cell ref
nexus9112 [7]

Answer:

Line second and third i.e, "typing the cell name, like "B4"  and clicking the cell to reference " the correct answer.

Explanation:

It relates to some kind of set of cells on the worksheet, which could be used to calculates the formula. It also helps to locate the information, which you want to analyze in the calculation. It can also provide the cell reference in  more than one formula in the same worksheet, that relates to Information on many other workbooks, and wrong choices can be described as follows:

  • Hovering provides the basic details, in which we hover, that's why it is wrong .
  • Zooming is used in projection, it can't be used in the cell reference, that's why it is wrong.
7 0
3 years ago
Read 2 more answers
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
Uses of internet write in point.​
Vladimir [108]

Answer:

-Electronic mail. At least 85% of the inhabitants of cyberspace send and receive e-mail. ...

-Research.

-Downloading files.

-Discussion groups. ...

-Interactive games. ...

-Education and self-improvement. ...

-Friendship and dating. ...

-Electronic newspapers and magazines.

3 0
3 years ago
Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume
IceJOKER [234]

Answer:

when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements

Explanation:

3 0
3 years ago
Other questions:
  • Is a software program that allows users to access the world wide web
    10·1 answer
  • What role do career pathways play?
    11·2 answers
  • Write a query to show the price reduced by 10% for all products that are tables or entertainment centers with a standard price g
    10·1 answer
  • Which of the following is not a skill set required by data scientists? A. Programming expertise B. Big data expertise C. Telecom
    11·1 answer
  • When you send an email how many computers does it go to
    12·1 answer
  • During which phase of film making does the team outline their vision for the film?
    5·1 answer
  • Interactive sites where users write about personal topic and comment to threaded discussion are called?
    10·2 answers
  • An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
    6·1 answer
  • Using a conversation voice is part of:
    9·1 answer
  • Give an explanation of one network connection (it will every helpful​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!