1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
4 years ago
12

Thomas is getting ready for a presentation. His slides are set, and he's

Computers and Technology
2 answers:
mamaluj [8]4 years ago
7 0

Answer:

(A) Go back to the source of the media to make sure the original files arent corrupted

Explanation:APEX APPROVED

Harrizon [31]4 years ago
5 0
I think the answer is B because all of the other ones dont make sense and wouldnt work in a time crunch
You might be interested in
What is a statement that runs only under counting conditions?
IRINA_888 [86]

Answer:

An if statement

Explanation:

An if statement runs provided the logical requirement is satisfied.

7 0
3 years ago
Olivia started working last year. By April 15th, she will need to prepare and send the Federal government _____.
omeli [17]
Income tax documents
5 0
3 years ago
Read 2 more answers
What button is marked with the little hollow square at the top of the right window
andrew11 [14]

Next to the close-window-button, is the minimize/maximize button
5 0
3 years ago
Read 2 more answers
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
Which creepy character is a user-generated myth in minecraft
horsena [70]
It would be slender man
7 0
3 years ago
Other questions:
  • List and describe the three types of cloud models described by Microsoft.
    9·1 answer
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • I am doing Microsoft Excel and I have do formulas, Can some please explain to me how do them?
    14·1 answer
  • What is the first step in planning a multi-table query?
    14·1 answer
  • In c++ when you create a class and you don't want to put the class and the main program in one source file and let's say you cre
    14·1 answer
  • Tips for Interactions with Personalized LinkedIn Outreach?
    5·1 answer
  • ILL GIVE BRAINLIEST HELLP.
    10·1 answer
  • Which of the following is NOT an example of application software?
    8·1 answer
  • What are the common internal components to most electronic devices?
    10·1 answer
  • Harry needs to make a presentation on packaging prototypes for a new product. Which presentation software elements can be use to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!