1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
2 years ago
7

Buying an existing business

Computers and Technology
1 answer:
HACTEHA [7]2 years ago
8 0
Goin to make great profit
You might be interested in
50 POINTS!!!
ycow [4]

Answer:

1. -> B.

2. -> C

3. -> A

Explanation:

1. Antennas = help the router fetch and transmit a signal

2. Repeaters = help in increasing the range of signal

3. Adapters = help the device detect a wireless signal

7 0
3 years ago
After inserting a video into your slide how can you test it
blagie [28]

Explanation:

How to insert video into PowerPoint

  1. Click on the slide you want, then go to Menu > Insert.
  2. In the top right corner, click Video > Video on My PC.
  3. Find the video you want to add and click “Insert”.
  4. Adjust the settings in the Video Format toolbar to make sure it plays the way you want.
7 0
2 years ago
List four tasks that humans perform frequently, but which may be difficult for a computerized agent to accomplish. Describe the
denis23 [38]

Answer:

im sorry for that

Explanation:

5 0
2 years ago
Which computer can be used where there is no regular electricity?​
alina1380 [7]

Answer:

A mechanical computer

Explanation:

Created from gears and levers

7 0
2 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Other questions:
  • Both the USB flash drive and the DVD are data storage devices, but they both have numerous differences. Both can contain insane
    6·1 answer
  • 5.
    6·1 answer
  • Should organizations fear websites where consumers post negative messages about products or services? What actions can companies
    12·1 answer
  • if a user has one column in a table and would like to make it into two columns which command should be used
    13·1 answer
  • Such a class might store information about the account balance, the name of the account holder, and an account number. What inst
    13·1 answer
  • Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
    7·1 answer
  • 4.2 lesson practice help plzs
    6·1 answer
  • 2. Kabel yang digunakan pada jangan wireline, sebagai
    14·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
  • You find information that you know to be classified on the internet. What should you do.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!