1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
4 years ago
11

Question # 4

Computers and Technology
1 answer:
bezimeni [28]4 years ago
6 0

Answer:

the last one I think not 100% sure

You might be interested in
To find and engage in Twitter conversations happening in specific geographical areas that are relevant to your company, you shou
Dahasolnce [82]

Answer:

Geo search streams

Explanation:

The " Geo search streams " should be used in Twitter to get involved in conversations happening within a specific geographical areas.

The Geo search streams are tools that can be used to filter out the content or conversations according to the geological locations i.e the filter to choose the  specific region or the regions nearby.

Thus, it will help to find the conversations that are relevant to the the company in the specific geographical area.

6 0
4 years ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
4 years ago
Select the correct answer.
goblinko [34]

Answer:

b

Explanation:

8 0
3 years ago
If you receive an email message you suspect is spam, what should you do?
Alla [95]

Answer:

A.  delete the message without opening it.

Explanation:

Never open emails you don't know who sent it, it could be a hacker trying to get your personal/financial information.

6 0
4 years ago
NEED HELP AGAIN
Anestetic [448]
The answer to the question is D)
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • How can an administrator force wireless clients to use a standard web browser to provide information, and require a user to agre
    10·1 answer
  • Which user characteristic may not be used to change keyword bids in adwords?:?
    11·1 answer
  • Used for monitoring web activity by users to make sure that sensitive information won't leave the building.
    7·1 answer
  • If you have an ordered list of all the states in North America, and you want to add a title "States of North America", what tag
    14·1 answer
  • Why do we use compliment method?
    13·2 answers
  • Please tell fast plzzzzzzzzzzz.​
    9·1 answer
  • HELP!!!!!!!
    8·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
  • Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!