1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
11

Enter the answer.

Computers and Technology
2 answers:
Ghella [55]3 years ago
7 0

Answer:

Unpublished Documents

Explanation:

Unpublished documents, these kind of document are for personal consumption and are not meant to be publicized or for public display and this form the primary source of documents and that can be make reference to anytime it is needed in the unpublished logs. Example of unpublished documents are financial reports, research and development, school reports cards etc.

ehidna [41]3 years ago
6 0

Answer:

you answer is wrong

Explanation:

the right answer is business

(-_-)

You might be interested in
Handhed computer is otherwise called as<br> 1.laptop<br> 2.Notebook<br> 3.Palmtop
NikAS [45]

Answer:

personal digital assistants (PDAs)palmtop

3 0
3 years ago
To generate a series of first ten counting number of algorithm​
Anettt [7]
Uhh i need points so i don’t fail math.
3 0
3 years ago
PLZZZ HELP MEE i need it done today
Marianna [84]

Answer:

1. B

2. C

Explanation:

7 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
A(n) _____ is similar to a virus, except that it is an independent program that can be spread across computer networks without b
CaHeK987 [17]
The term you're looking for is worm
5 0
3 years ago
Other questions:
  • What does "Forward" in emails do?​
    7·1 answer
  • Select the best answer for the question. 2. What is the simplest way to permanently get rid of an unwanted file?
    13·1 answer
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    12·1 answer
  • What are the two main functions of user accounts in Active Directory? (Choose all that apply.) Allow users to access resources m
    7·2 answers
  • You are part of a team that is setting up a movie streaming service. The company is planning on initially making available 500 m
    9·1 answer
  • In an AND truth table.
    7·1 answer
  • Super easy question but you have to think about it because it’s not that easy I’ll mark brainliest for first answer Explain the
    11·1 answer
  • PAGE<br>DATE<br>0 What types of information should be there internet?​
    5·1 answer
  • Which job role requires you to create user guides for computer products and services?
    11·1 answer
  • Which of these is a type of social engineering attack?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!