1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
4 years ago
6

In a geographic file arranged by state and then city, you would file a letter from a company that does not have an individual or

city folder in the file in a(n) a. alphabetic name file. b. newly prepared special city folder. c. newly prepared individual folder. d. general state folder.
Computers and Technology
1 answer:
telo118 [61]4 years ago
4 0

Answer:

D. General State folder.

Explanation:

In <em>geographical filing</em>, files received by persons, organizations, firms or businesses are categorized according to their location. This filing method can then be arranged according to numeric or alphabetic order as determined by the filing organization.

Persons, business or organizations that do not specify their business location are placed in a general state folder until their locations are identified.

You might be interested in
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
Pros of mobile devices on young people during their free time
Elis [28]
Studies have shown that the people who spend more time on social media are better to show virtual empathy to their online friends 
8 0
3 years ago
What is added to brining liquid to add flavour​
Inga [223]

Answer:

Wet brining is a method of adding flavor to a meat by soaking it in a salt solution prior to cooking. A general rule of thumb is to soak the meat in a solution of 1 cup of salt for 1 gallon of water. When cooked, the salt will stay in the meat, adding flavor, and the liquid will be cooked out.

7 0
3 years ago
________ programs help solve the problem of running out of storage space by providing lists of application programs, stored vide
Leviafan [203]

Answer:

Storage management

Explanation:

The programs that do this are known as Storage management programs. They are incredibly useful since they allow you to see which files are taking up the most amount of space as well as the importance that each file has on the system. Many of these programs have a different visual representation of the files such as pie charts or system blocks showing the percentage of space it is taking up. Everything in these programs is made to help the end-user visualize and analyze their data thoroughly.

7 0
3 years ago
Where is the start frame delimiter found in the Ethernet frame
Ksju [112]
Answer: The SFD is the eight-bit (one-byte) value that marks the end of the preamble, which is the first field of an Ethernet packet, and indicates the beginning of the Ethernet frame.
8 0
3 years ago
Other questions:
  • What is the most important external issue when using social media in emergency management?
    6·1 answer
  • What is the purpose of an exhaust emission system
    6·1 answer
  • Please help with attached file
    8·2 answers
  • Which of the following provides services to hosts on its network?
    9·1 answer
  • Agile methods typically use a ______ model, which represents a series of iterations, or revisions, which are based on user feedb
    7·1 answer
  • Please help meh T^T Which of the following describes an application error? Select 2 options.
    5·2 answers
  • Can i get any information on this website i'd like to know what its for ?
    11·1 answer
  • I need to find out how to mark brainliest so just answer this and the first person will be marked brainliest.
    12·1 answer
  • What does the term attenuation mean in data communication?
    11·1 answer
  • Jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!