1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
4 years ago
12

Briefly explain five measures you have undertaken to protect your confidential

Computers and Technology
1 answer:
Gnom [1K]4 years ago
5 0

Answer:

by putting it in old fashioned password box

Explanation:

I I think I should say so that's a good person is not able to go see guys place where there's a nice specifically said that it must be old fashioned lunch boxes I don't usually be opened

You might be interested in
Computers are able to think like human beings true or false?
Temka [501]

Answer:

False. Cuz they work the way they are programmed, which can be like a human being, but is not exactly it. They are built this way so they work as what the user thinks. (e.g. being sure to delete a file/recommending what the user might like)

make me brainliestt :))

7 0
3 years ago
Words or symbols that help you narrow down your search are called:
timurjin [86]

Answer:

c) search operators

Explanation:

Words or symbols that help you narrow down your search are called search operators. This ultimately implies that, search operators are commands and special characters (words or symbols) which help users to filter and refine their search engine results by making the search more precise and specific in nature. Thus, search operators only provide search engine results that are relevant to what a user is searching for or it narrow down the focus of a search.

Hence, search operators comprises of commands and special characters (words or symbols) such as AND, OR, NOT, "", -, +, *, .., :, etc used for narrowing down search engine results.

For instance, typing "file.mp3" in a search engine would only present results that are in mp3 formats.

7 0
3 years ago
What version of bluetooth is installed on the yaesu ft-5dr?.
Olin [163]

Answer:

version 4.2

Explanation:

5 0
2 years ago
Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
Anna71 [15]
Important tools used in the "Define" phase of the DMAIC process include a project charter, a description of customer requirements, process maps, and Voice of the Customer (VOC) data.
6 0
3 years ago
*explain why computer literacy is vital to access in today’s business work
kkurt [141]

Answer:

Computer literacy is vital to access in today’s business work because of advanced technology which ensured that most companies run a computerized system as against the manual one which was existent in the past.

The use of computerized system enables work to be done faster and in a more accurate manner which is why bring a computer literate is widely embraced in the world today.

8 0
3 years ago
Other questions:
  • With a(n) ____, you can enter a value either by typing the value or by selecting it from a list.
    14·1 answer
  • Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. Given a variable modelYear write a state
    11·1 answer
  • No workplace is immune to the threat of workplace violence. true or false
    9·2 answers
  • The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if
    12·1 answer
  • Which of the following occupations is the most likely o require working weekends and night shifts
    11·2 answers
  • Consider the scenario below. Will the solution attempted by the technician fix the problem or make it worse? Defend your answer.
    5·1 answer
  • 1.in 3 sentences explain briefly what are the examples of the advantage of using multimedia approach in a slide presentation bra
    8·1 answer
  • If any one has mincraft on ps4 bedrock we can finish building a BIG city world all we need to put is a shop and money dispensers
    8·2 answers
  • The process of providing only the essentials and hiding the details is known as _____. Group of answer choices algorithm abstrac
    6·1 answer
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!