1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
never [62]
4 years ago
10

Select the answers that best describe showing respect for confidential data. Check all of the boxes that

Computers and Technology
1 answer:
kupik [55]4 years ago
3 0

Answer:

The first (The security administrator makes sure to shred and properly dispose of any printed confidential information) and third (The security administrator uses password-protected files and folders on his work computer.) ones are correct.

You might be interested in
When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides
Shalnov [3]

When resizing an image or an object in a presentation, a user should not utilize the sizing handles in the middle of the sides or the bottom of the image. There's nothing wrong with resizing this way.

There's nothing wrong with resizing this way

<u>Explanation:</u>

When the sizing handles in the middle of the sides are used, the image stretches out reflecting an increase in the width maintaining There's nothing wrong with resizing this way.

On the other hand, while using the sizing handles at the bottom, the image increases in height whilst maintaining the same width again disturbing the aspect ratio.

5 0
3 years ago
Read 2 more answers
A(n) _____ is any computer that provides services and connections to other computers on a network.
Lera25 [3.4K]
Server or motherboard
3 0
3 years ago
Please, give me a comic or story idea. I will mark brainliest. ( i need 5 slides with 2 characters in the story or comic) Please
salantis [7]

Answer:

Jack and John

Explanation:

Jack called John and offered him to come with him and some other friends to go out to the mall.

.....

8 0
3 years ago
Read 2 more answers
Authentication header verifies the integrity of tcp/ip packets by signing them with a digital signature. true / false?
Alecsey [184]
Ture the <span>Authentication header verifies the integrity of TCP/IP packets by signing them with a digital signature. </span>
4 0
3 years ago
3. Describe how you would properly dispose of the following materials so that you do not damage the environment. Write on each t
Norma-Jean [14]

Answer:

wwe

Explanation:

8 0
2 years ago
Other questions:
  • The main storage device inside a computer where programs and files are saved is called the
    5·1 answer
  • PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is
    14·1 answer
  • In what year was the 1st zelda game released
    5·2 answers
  • In Python please:
    14·1 answer
  • What happens when you submit the following code?a.Because the OUTPUT statement does not specifya data set, both output data sets
    6·1 answer
  • CLI is not used friendly ​
    15·1 answer
  • How do I mark brainlyist
    7·2 answers
  • What does intelligent route planner show to owners when they have entered a destination into the navigation system in 2023 ariya
    11·1 answer
  • Select the correct answer.
    9·1 answer
  • Which of the following criteria was a key milestone for the object-relational model created in the mid-1980s?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!