1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
8

Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was

when the employee last performed a backup. Which type of network is the company more than likely using?
Computers and Technology
1 answer:
hichkok12 [17]3 years ago
7 0

WWW/ World Wide Web.

You might be interested in
You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
miv72 [106K]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

"D" option is correct

           "Each statement needs to end in a semicolon."

semicolon must use in program.without semicolon program doesn't accept.so each statement needs to end in a semicolon.

4 0
3 years ago
Who needs to be involved when assembling business solutions that include hardware and software?
sveta [45]
Software engineer i would say
5 0
3 years ago
Read 2 more answers
What is the first thing Kernel does when WinLoad turns over the starttup process to it
SashulF [63]

It activates HAL, reads more information from the registry, and builds into memory the registry key

4 0
3 years ago
"In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number."
natita [175]

Answer:

ASCII is the correct answer for the above question.

Explanation:

  • ASCII is used to encode any character which is understood and used by the computer system.
  • It is also known as the American standard code for information interchange. It is used to represent any character in the form of 7 bit-binary number which can be used for the computer system.
  • It is designed for computers. It is in the binary language because the computer can understand only binary language.
  • The above question asked about the file which holds the special character and presented in the form of binary. This file is known as the ASCII file which is described above.
4 0
3 years ago
Carly wants to be able to look at a document without having to use the horizontal scroll bar located on the bottom of the screen
Leno4ka [110]

Answer:

I think it's "Carly will set the page to Page Width, and Rhianna would zoom to 150%." If Carly doesn't want to use the zoom thingy, then she probably would just change the page orentation (idk if I spelled that right). Rhianna wants to zoom in, so that's why I said that. It's either "A" or "C."

Explanation:

I hope this helps!

5 0
3 years ago
Other questions:
  • Why are there 2 types of ip addresses like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1?
    10·1 answer
  • Which method of deleting files can be used in windows xp and vista?
    12·1 answer
  • which of the following sentences uses active voice?(answers to choose from are in the photo)-this is in my computer applications
    14·2 answers
  • The work principle is not always true<br> T or F
    11·2 answers
  • 1. Bones do not change position when the muscles contract and release.
    7·1 answer
  • How does this app work?
    11·2 answers
  • Which part of the Word application window should the user go to for the following activities?
    14·1 answer
  • The art element line is a moving point.<br><br><br> True or False
    15·1 answer
  • Using the drop-down menu, complete these sentences to describe algorithms. Algorithms are instructions to solve a problem. Algor
    12·2 answers
  • What changes the size of a video when played?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!