1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
14

What are the two types of primary safeguarding methods

Computers and Technology
1 answer:
hjlf3 years ago
8 0

Answer:

Guards and devices

Explanation:

You might be interested in
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
2. You can ___ adjust to NOT sleeping at night.
zhannawk [14.2K]

Answer:

whats the answer chooses

Explanation:

7 0
3 years ago
Select the correct answer.
storchak [24]

Answer:

B. Planning

Explanation:

I believe the developer establishes the project goals in the planning phase.

6 0
4 years ago
If you do not want the border style to carry forward each time the enter key is pressed, you need to ____.
ANEK [815]
Hello <span>Endermss2118 </span>

Answer: If you do not want the border style to carry forward each time the enter key is pressed, you need to Clear formatting


Hope This Helps
-Chris
8 0
3 years ago
What do you mean by word-wrap?
olga2289 [7]

Answer:

it is also know as line breaking

Explanation:

is breaking a section of text into lines so that it will fit into the available width of a page, window or other display area

3 0
3 years ago
Other questions:
  • In which area of engineering does material selection play a vital role a design optimization b forensic engineering c mechanical
    6·1 answer
  • Which partitioning method must be used for partitioning a 4-tb hard drive?
    6·1 answer
  • Which option is NOT in the Link to portion of the Insert Hyperlink dialog box?
    5·2 answers
  • Hands-On Project 15-4 Make Network Cables
    8·1 answer
  • Romans are credited with “inventing” the capital city l? T or F
    6·1 answer
  • How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
    10·1 answer
  • The rate of flow is called
    11·1 answer
  • Am I going to ever go back to school?
    12·2 answers
  • Marcus creates a HTML webpage on his favourite game, football. On clicking the word “football” another website containing the in
    14·1 answer
  • I will give brainyest
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!