1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
4 years ago
12

If a document reaches you, and requires you to perform some action, you should do it immediately if ________. a. It is from your

mother or father b. It seems important but not urgent c. It will take less than two minutes to complete d. The language in the document is polite
Computers and Technology
1 answer:
tatyana61 [14]4 years ago
8 0
C is the answer to this
You might be interested in
What is a database query?
lana [24]
C.a form used to create a new tables for the database
8 0
3 years ago
Read 2 more answers
What's the biggest security issue with using social networking sites to market your listings?
Savatey [412]

The biggest security issue with using social networking sites to market your listings is Criminals may use social networking sites to identify your personal data.

<h3>What is a social marketing site?</h3>

A social marketing site is a site where people from around the world are connected in one place and share their thoughts and photos and other data.

The social sites are on the internet and there is a chance of stealing data and it identity theft, phishing, online predators, internet fraud, and other cybercriminal attacks are also some risks.

Thus, the largest security concern with using social networking sites to sell your listings is that thieves could use these sites to find personal information about you.

To learn more about social marketing sites, refer to the link:

brainly.com/question/15051868

#SPJ4

6 0
1 year ago
What type of software controls the hardware of a computer? Desktop publishing software Spreadsheet applications Groupware applic
Hatshy [7]
It's most likely the Operating System Applications
4 0
3 years ago
In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
Shkiper50 [21]

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

3 0
3 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Other questions:
  • You are creating a budget for your new business.What should you include
    15·1 answer
  • What event in the 1970s contributed to the current
    6·2 answers
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    6·1 answer
  • What is the most recent version of Microsoft Windows?
    12·2 answers
  • In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
    5·1 answer
  • Which statement is most likely to be true about a computer network?
    12·2 answers
  • Program Convert Measurements:
    15·1 answer
  • Can able to Computer decide its input by itself? How ?​
    15·1 answer
  • Suppose that you set the application-level environment setting for the current workspace to store all your data in the same geod
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!