1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dominik [7]
3 years ago
14

Which of the following statements is correct?

Computers and Technology
1 answer:
vaieri [72.5K]3 years ago
7 0

Answer:

A

Explanation:

I think is A. or maybe search up the topic of the lesson

You might be interested in
E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
lana66690 [7]
You should send a Carbon Copy to your manger. You would type your manager's email into the slot next to cc.
5 0
3 years ago
Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?
monitta

Answer:

Computer Forensics

Explanation:

Your Welcome....

8 0
3 years ago
In the story, what are the song pauses a metaphor for?
-BARSIC- [3]

Answer:

D. The need to slow down more often in life.

4 0
3 years ago
What is the function of a CPU? simple words:D
koban [17]

Answer:

The brains of a computer

4 0
3 years ago
Read 2 more answers
In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
Shkiper50 [21]

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

3 0
3 years ago
Other questions:
  • Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
    11·1 answer
  • Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
    6·1 answer
  • A type of Knowledge Management System is called
    5·1 answer
  • Which type of NAC agent will be used during the posture assessment before allowing access to the VPN users?
    9·1 answer
  • What is ambiguous grammar, explain in maximum 50words.
    5·1 answer
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • Drag the right word to it’s definition
    13·1 answer
  • Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The
    8·1 answer
  • Choose the missing words in the code below.
    12·1 answer
  • Upload your completed project including the following:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!