1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
13

Which of the following are computer safety techniques? Check all of the boxes that apply.Identify Computer Safety Techniques:

Computers and Technology
1 answer:
zvonat [6]3 years ago
4 0

Answer: Protect the system with a password  

               Use spam protection.

               Avoid using questionable software.

               

Explanation:

You might be interested in
List three differences between word and excel
34kurt

Answer:

Word: A word processor

           File extension is .doc

          Images, texts, and graphic styles can be added

Exel: A spreadsheet software

       Comprises rows and columns which combine to form cells

       File extension is .xls

I hope i helped! xoxo

4 0
3 years ago
What is an internal node?
Phantasy [73]
An internal node is a node which carries at least one child or in other words, an internal node is not a leaf node.
8 0
3 years ago
michelle works in retail and cant decide what products to include in the stores front window display. what is the first step she
Nataliya [291]

Correct answer is state the problem

5 0
3 years ago
Read 2 more answers
Explain the working system of computer systems with examples​
geniusboy [140]

,I don't know you all about computer

8 0
3 years ago
All of the following are methods to improve the communication of your key messages EXCEPT:
uysha [10]

Answer:

Fill the slides with images and animations

Explanation:

these will most likely distract the audience

6 0
3 years ago
Read 2 more answers
Other questions:
  • Is a protocol that allows users to log on to and access a remote computer?
    8·1 answer
  • Distinguish the functional requirements an engineer would have to specify for a taxi dispatch system.
    8·1 answer
  • Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute
    11·1 answer
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • jason works for a restaurant that serves only organic local produced what trend is this business following?
    6·2 answers
  • What does a page break do?
    13·1 answer
  • Task 2: Typing a School Speech
    12·1 answer
  • Write a function named findmax()that finds and displays the maximum values in a two dimensional array of integers. The array sho
    13·1 answer
  • Which tab on the ribbon in the folder window allows users to change how the contents of the folder are being shown?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!