1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
5

To determine why a computer program started to function differently, Mel should most likely use data to

Computers and Technology
2 answers:
forsale [732]3 years ago
8 0

Answer:

B. <u>convince the software company of the issue</u>

Explanation:

Amiraneli [1.4K]3 years ago
3 0

Answer:

convince the software company of the issue

Explanation:

You might be interested in
Which elements of text can be changed using automatic formatting? Check all that apply.
SIZIF [17.4K]
A) smart quote and B) the zoom percentage and E) the addition of special characters
7 0
3 years ago
You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Ma
Anna71 [15]

Answer:

Following are the solution to the given question:

Explanation:

The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.

5 0
3 years ago
Question 5 of 50
erik [133]

Answer:

D

Explanation:

because it is more safe than a key

4 0
2 years ago
What are node in a computer network​
BabaBlast [244]

Answer:

A node is a connection point inside a network that can receive, send, create, or store data. Each node requires you to provide some form of identification to receive access, like an IP address. A few examples of nodes include computers, printers, modems, bridges, and switches.

3 0
3 years ago
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
BabaBlast [244]

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

5 0
3 years ago
Other questions:
  • Which change signaled a musical progression toward rock and roll?
    14·1 answer
  • What are some cloud storage devices?​
    10·1 answer
  • The Appliance Warehouse case study is designed to practice systems analysis and design skills using a life-like scenario. Applia
    14·1 answer
  • Compare and contrast an example of an actual company that has a brick and mortar location with an actual company that does not h
    8·1 answer
  • A particular problem is currently not able to be practically solved by using an algorithm. Which of the following statements abo
    13·2 answers
  • What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
    5·1 answer
  • A local bank has just one branch. It sets up a peer-to-peer network for all devices on the system. The bank would like to be abl
    12·1 answer
  • Whats the answer :)?<br>i will give brainslist​
    11·1 answer
  • 8.
    9·1 answer
  • What is professional education? <br><br><br><br><br>Please help me to do this.​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!