1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
10

____ are types of changes that occur when text has been omitted from a document and must be inserted later.

Computers and Technology
1 answer:
VMariaS [17]3 years ago
7 0
You already wrote the answer. It is Additions
You might be interested in
If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the p
Tanya [424]
<span>If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
Answer: That statement is Ture</span>
3 0
3 years ago
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digita
LUCKY_DIMON [66]

To avoid privacy these copyright is been implemented. If copyright is not implemented software company such as Microsoft, Google cannot run the organization so that software has copyright and licenses and they protect from software privacy.

<u>Explanation:</u>

Since the world is digital world all software are available in internet for download and end user will not pay for software and use the software without purchasing from software development industries.

Even software are protected with key, hacker write the tool to brakes the key, so end user easily use these tools and generate the key and user it.

So that software company use Digital millennium copyright act, so that end user can arrested for missing the software’s.

5 0
3 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
The rhythmic note that three beats is called a____half note.
aev [14]

Answer:

it is called a dotted half note

7 0
3 years ago
Read 2 more answers
Jamal is installing new software and would like a step-by-step guide to teach him how. Which resource would be best, and why?
ratelena [41]
The answer is D because it will explain and show how to install the software.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Lance has three tables in his database he wants to generate a report to show the data from the three table so he decides to link
    6·2 answers
  • Online dictionaries are a type of​
    9·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • People in STEM careers are considered thinkers who reach conclusions through sound judgment and reasoning.
    11·1 answer
  • ______ includes websites that encourage interaction and connection among people, businesses, and organizations.
    9·2 answers
  • Can you get financial aid with average grades
    15·1 answer
  • The system partition is the partition that contains the files required to load the operating system (bootmgr, and BCD). The syst
    9·1 answer
  • Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    13·1 answer
  • Design an if-then statement ( or a flowchart with a single alternative decision structure that assigns 20 to the variable y and
    5·1 answer
  • Una laptop agarra mas internet que una computadora de escritorio?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!