1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
10

QUESTION

Computers and Technology
1 answer:
mojhsa [17]3 years ago
6 0

Answer:

I'm pretty sure the answer is position. sorry if im wrong, though

You might be interested in
Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
Alborosie

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

3 0
3 years ago
Tools used to build a bridge<br>​
Sati [7]

Aerial Lifts,

Vertical Masts and Hydro Platforms,

Telehandlers,

Excavators,

Skid Loaders,

Backhoes,

Cranes,

Air Compressors.

If It was helpful, can you make me brainliest please?

6 0
3 years ago
Where does a word processor store items that you cut or copy?
V125BC [204]
<span>it is stored on your clipboard and you can get to it by pressing ctrl+c</span>
3 0
3 years ago
When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and softwa
Brums [2.3K]

Answer:

Fault tolerant system

Explanation:

Fault tolerance is the property that keeps a system operating properly in the event of a failure of one of the components within the system

A fault tolerant system enables the system to continue its operation possibly at a reduced level, rather than having the whole system breakdown.

A good security expert understands the need for fault tolerance in a comprehensive security system, as the absence of this can lead to serious security breaches once the whole system is down.

6 0
3 years ago
Mail merge can be used in business to complete which of the following tasks
Likurg_2 [28]

Answer:

Mail merge lets you create a batch of documents that are personalized for each recipient. For example, a form letter might be personalized to address each recipient by name. A data source, like a list, spreadsheet, or database, is associated with the document.

8 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is a sigh that your computer may have been infected with malicious code
    12·1 answer
  • Digital manufacturing has impacted our world today! List a reasons why.
    11·1 answer
  • Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
    6·1 answer
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • What does that program print out?<br><br> a) 2<br> b) 3<br> c) 4<br> d) 8
    14·2 answers
  • Which character goes at the end of a line of code that starts with if?
    8·1 answer
  • I need help with Exercise 3.6.7: Sporting Goods Shop in CodeHS. ASAP
    5·1 answer
  • How to prevent water pollution​
    10·1 answer
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • How to test someone elese internet speed from a distance
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!