1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
11

Hey there everyone, i have a technology class assignment and it is to get 200 subs on YT... it counts as assessment grade and i

need help because im only at 100 (dont have many friends as you can tell... most other people just say no) Please if you can, help me out
Computers and Technology
1 answer:
VikaD [51]3 years ago
4 0

Answer:

You have support

Explanation:

I hate it when our classes do this, i had this exact assignment a while back :/

Nice dominoes you got there. Very creative! : D

You might be interested in
Correct or False, when formatting conditional data, I start by selecting the range of data that I want to format
Arturiano [62]

Answer:

Correct

Explanation:

4 0
4 years ago
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
What is the function of input device?​
Akimi4 [234]

Answer:

The function of an input device is to communicate information to a computer or other sort of information processing equipment. Input devices are types of peripheral devices that communicate with processing units.

5 0
3 years ago
Your company has decided to store data files in Cloud Storage. The data would be hosted in a regional bucket to start with. You
Natasha_Volkova [10]

1. Necessary backup from cloud storage to client workstation or desktop or pc.

2. Delete 30 day and one year data from cloud storage.

<u>Explanation:</u>

Purging the data is used in database where necessary backup and purging the data up to certain years. So that database is access will be faster.

At cloud storage it has very limited storage's and by increasing storage will cost more to company or organization, as best practices every 30 day the purge old data should done in cloud storage's and with necessary backup  to be taken as precautionary measurement.

Once data is completed more than one year, with necessary backup delete old year data from cloud storages. Some cases old dead account where been deactivated also can deleted depends of organizations policy.

7 0
3 years ago
What is network hardware?
vovangra [49]
Modem, router, switch, server, etc. these are hardware meant to facilitate the transfer or storage of remote information.
8 0
3 years ago
Other questions:
  • To enable a compute or device that does not have built-in networking capability, use a(n) ______.
    13·1 answer
  • A user is connecting to an e-commerce server to buy some widgets for a company. the user connects to the site and notices there
    10·1 answer
  • Scanning low allows you to locate __________ before you hit them
    13·1 answer
  • What is the name of the top-level parentless folder in a digital file system?
    8·1 answer
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • What are the ten application areas of computer?​
    10·1 answer
  • Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the
    9·1 answer
  • When is founded by java
    7·2 answers
  • 13. WHICH OF THE FOLLOWING IS INVOLVED IN CREATING A DOCUMENT? *
    7·1 answer
  • Which type of malware prevents you from accessing files stored on your computer?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!