1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
6

When does information become a liability for an organization

Computers and Technology
1 answer:
Vikki [24]3 years ago
7 0

Answer:

A. When it is not managed properly

Explanation:

when stuff is not mananged as it should then it becomes a liablilty

You might be interested in
The proxy statement issued by a corporation is a requirement of: a. The Securities & Exchange Commission (SEC) b. The Financ
8090 [49]

Answer:

The answer is "Option a".

Explanation:

A proxy statement is a file, that provides security and exchange in data commission, that is a powerful tool for holders, as it tells employees, that together with the instructions to do, and other choices, which could be listed as follows are wrong:

  • In option b, It is used in accounting guidelines, that's why it is wrong.
  • In option c, It requires, that's why it is incorrect.
  • In option d, It is wrong because it doesn't committee.
8 0
4 years ago
Why do i have to wait and watch videos
Mila [183]

The reason being is because of your search history. Google will remember everything you like to watch, look, play or buy things on the computer or any device with internet. Since you are interested in the things you like to do, you're computer will remember this and will display Ads made by companies, or people, which possibly may be a scam, or may give a virus. I would advise to avoid these things as much as you can.

7 0
3 years ago
I’m which scenario would someone most likely be using presentation software ?
timurjin [86]

Answer:

100% the first one. the other ones would either be documents or spreadsheets

Explanation:

because oBaMa

6 0
3 years ago
Read 2 more answers
The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
Irina18 [472]

Answer:

postincrement.

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

The postincrement operator increases the value of the variable by 1 after the original value is used in the expression in which the variable appears.

7 0
3 years ago
642<br> +277<br> What does 642+277
svet-max [94.6K]
Answer:
642+277= 919
6 0
3 years ago
Other questions:
  • What does microsoft recommend for large organizations requiring desktop virtualization for many clients? quizlewt?
    10·1 answer
  • On most computers, the default font size in word is ____. 8 11 14 16
    8·2 answers
  • I really love my voice when not recorded. Now when I record my voice, I feel like its high pitched and horrible. Do I really sou
    11·1 answer
  • Which charges a fee for access to read, research, or copy articles and other published materials?
    11·1 answer
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • Which type of rock is created when lava cools and hardens?
    5·2 answers
  • Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
    12·1 answer
  • How can you make your MakeCode micro:bit program display either the letter<br> A or the letter B?
    11·1 answer
  • The Internet Protocol Suite consists of the Internet Protocol and _____. a. Transmission Control Protocol b. File Transfer Proto
    15·2 answers
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!