1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
7

If you delete a view, account administrators can recover the view using the "trash can" function within how many days?

Computers and Technology
2 answers:
Airida [17]3 years ago
8 0

answer

35 days

Explanation

If you delete a view, account administrators can recover the view using the "trash can" function within 35 days.

Trash can also known as recycle bin is a temporary that stores files which have been deleted by the user but not yet permanently deleted or erased from the file system.

Natali5045456 [20]3 years ago
3 0
The question has multiple choices

a) 35
b) 65
c) 95
d) 125

An account admin is able to recover a deleted view within 35 days. If the deleted data is not restored within 35 days, the trash can feature automatically empties. Therefore, it is always important to catch your deleted data before then.


You might be interested in
The number of distinct proper subsets of a set with n elements is.
777dan777 [17]

Answer:

Their are sets of the numbers that you add and subtract

Explanation:

8 0
3 years ago
The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
ivanzaharov [21]
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

3 0
4 years ago
Addison, Inc. uses a perpetual inventory system. Below is information about one inventory item for the month of September. Use t
Citrus2011 [14]

Answer:

a.$750

Explanation:

LIFO inventory system means LAST IN FIRST OUT, so leté see what happens during september:

  • Sep 1 st=> Stock is 20 units at 20$ => 400$
  • Sep 4 th => Inventory decreases in the 10 units sold. Final inventory is (20-10) =10 units at 20$= 10*20= 200$
  • Sep 10th => inventory increases in 30 units at 25$ => final inventory is 30u*25$/u+10u*20$/u=950$
  • Sep 17th =>with the sale of 20 units the inventory decreases, and since we are using a LIFO system, the 20 units sold are the last purchased , so we sold 20 units with a cost of $25. Final inventory: 10units at $20+ 10 units at $25 = 450$
  • Sep 30Th with the purchase of 10 additional units at $30, we have a final inventory of 30 units: 10 units at $20+ 10 units at $25 + 10 units at $30= TOTAL FINAL INVENTORY= $200+$250+$300 => $750
4 0
4 years ago
To paste text with the same formatting as the document in which it is entered, select _____ from the Paste menu.
shusha [124]
Merge Formatting because you are merging the format of the document you copied from. So basically you are moving the format over.
3 0
3 years ago
which two host names follow the guidelines for naming conventions on cisco ios devices? (choose two.)
vlabodo [156]

RM-3-Switch-2A4* and SwBranch799* are the two host names follow the guidelines for naming conventions on cisco ios devices. The correct options are 2 and 3.

<h3>What is a host name?</h3>

A hostname is a label assigned to a computer network connected device that is used to identify the device in various forms of electronic communication, such as the World Wide Web.

Hostnames can be simple single-word or phrase names, or they can be structured.

The two host names, RM-3-Switch-2A4 and SwBranch799, adhere to the guidelines for naming conventions on Cisco iOS devices.

Thus, the correct options are 2 and 3.

For more details regarding host name, visit:

brainly.com/question/13267319

#SPJ1

Your question seems incomplete, the missing part is attached below:

7 0
2 years ago
Other questions:
  • Earthquakes happen in the Earth’s
    10·1 answer
  • "The process was placed in a suspended state by an agent; either itself, a parent process, or the OS, for the purpose of prevent
    10·1 answer
  • The ___________ command waits for windows 7 to save your work and then turns off the computer fans and hard disk. answer shut do
    11·1 answer
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • A _____ is inserted so that a portion of a document that can have different formatting from the rest of the document. a. heading
    9·1 answer
  • How does cryptocurrency exchange software works?
    14·1 answer
  • Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these t
    9·1 answer
  • The process of specifying that certain rows be displayed in the results of a query is known as selection. ______________________
    13·1 answer
  • What is keyword density?
    15·2 answers
  • The first time that a particular visitor loads a web site page is called a(n) _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!