1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
8

Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was

when the employee last performed a backup. Which type of network is the company more than likely using?
Computers and Technology
1 answer:
hichkok12 [17]3 years ago
7 0

WWW/ World Wide Web.

You might be interested in
What special skill does a developer need to thelp produce timely solutions for users
Gnom [1K]
All we need is Faith, Trust, and Pixie Dust...
4 0
3 years ago
Which of the following components was a significant development featured in the Macintosh LISA computer?
Free_Kalibri [48]
I believe that the Apple Lisa computer was the first production microcomputer to have a GUI.
3 0
3 years ago
An employment situation that pays bills but is largely unfilling is
Ilia_Sergeevich [38]

Answer:

Explanation:Any job that a person doesn't particularly like or enjoy.

7 0
3 years ago
How do I make my own extension for chrome?
Alexeev081 [22]
Open your browser and click the 3 strip bar in the conner and then look toward the bottom and click settings and it will open a new browser and then you are going to look at the left side and you will see extension click it and there you go...

4 0
3 years ago
Ashley is the record keeper for a bookshop. She gathers and maintains an organized collection of information. What is Ashley usi
maks197457 [2]

The answer is Database.

Reason being is because because the definition of database matches the statement.

- Collection of information that is organized so that it can be easily accessed, managed and updated. 

3 0
3 years ago
Read 2 more answers
Other questions:
  • I am confused in Java!
    12·1 answer
  • What are some ways in which reading and writing have changed in our newly networked world
    10·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • PLEASE HELP
    8·2 answers
  • Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
    10·1 answer
  • What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
    5·1 answer
  • A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
    7·1 answer
  • What is computer and example<br>​
    5·1 answer
  • Do you think people are willing to buy these products? Why?
    13·2 answers
  • Write a calculator program that will allow only addition, subtraction, multiplication &amp; division. Have the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!