1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
9

You are working at Walmart when a shipment of tee shirts is delivered, the manager asked you to arrange the shirts on the rack b

y size. What process is this an example of?
Computers and Technology
1 answer:
madreJ [45]3 years ago
6 0

this would be arranging by size. Small < Large usually

You might be interested in
Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into
MrRa [10]

Answer:

B. Firewall

Explanation:

Firewall, just like encryption prevents unauthorized entry into a computer. However, Firewall can be implemented in both hardware or software form; or even a combination of both.

7 0
3 years ago
Petra has an interview with an IT company. What technique can help prepare her?
SVEN [57.7K]
I would go C because that way it gets her prepared to answer any techie questions they would have for her and would make her a better option.
3 0
3 years ago
Read 2 more answers
3 Points<br> What was the first computer programming language?
maksim [4K]

Explanation: Well the first one was Plankalkül, but it wasn't implemented untill 1998. But the first to be actually used was Short Code.  

6 0
3 years ago
Read 2 more answers
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
Sharing a workbook helps to complete on time. Multiple people accessing the workbook help to build
BlackZzzverrR [31]
Collaboration skills
7 0
3 years ago
Other questions:
  • What is a data mining??
    5·1 answer
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our s
    6·1 answer
  • What is the value of length after the code that follows is executed?int[][] nums = { new int [] {1, 2, 3},new int [] {3, 4, 5, 6
    8·1 answer
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • Window frame will expand to fill the entire desktop when you
    12·1 answer
  • To change lowercase letters to uppercase letters in a smaller font size, which of the following should be done?
    10·1 answer
  • What function is used to return the results in column D?
    11·1 answer
  • Which of the following is considered true regarding modern work environments?
    9·1 answer
  • You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar
    10·1 answer
  • How many 3 byte sequences contain at least five consecutive 0-bits
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!