1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
r-ruslan [8.4K]
3 years ago
10

Give two examples of how you have shown responsibility and dependability

Computers and Technology
1 answer:
morpeh [17]3 years ago
8 0
I've done all my classwork and chores a week before they're supposed to be completed :)
You might be interested in
!!! 20 points !!!!!
puteri [66]

Answer: I need more info to answer this question

Explanation:

8 0
1 year ago
Does the Main Content (MC) of a web page include searchboxes?
Tanzania [10]
Yes it does use search boxes
8 0
3 years ago
Read 2 more answers
Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance o
kotykmax [81]
The answer is Software as a Service (SaaS).

SaaS is one of the 3 main categories of cloud computing. In SaaS, a 3rd party provider hosts applications and make them available to customers over the internet. It removes the need for businesses to install and run applications on their own data centers or computers. It also eliminates the expense of hardware acquisition and maintenance, as well as software installation and support.
7 0
3 years ago
Read 2 more answers
Is a NAS just a collection of hard drives or a computer
skelet666 [1.2K]

Answer:

NAS systems are networked appliances that contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.

8 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
Other questions:
  • An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
    7·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • Clicking the ____ opens the insert function dialog box.
    13·1 answer
  • What can provides access to the only menu in office 2007​
    13·1 answer
  • What does XD mean? I keep seeing people say it and I dont know what it means
    6·2 answers
  • How is a digital representation of analog data a form of abstraction? Why is the quality of the photo, music, etc better when mo
    11·1 answer
  • NEED HELP ASAP!!!!!!
    7·2 answers
  • G i r l s o n l y j o i n <br> id= ons jcuv jke
    13·2 answers
  • Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of paper
    12·1 answer
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!