1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
8

Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you st

ore that information?
Computers and Technology
1 answer:
Gnom [1K]3 years ago
5 0

The main other documentation forms that must be maintained are the log files the codes and the other important codes that are necessary for the computer to function and for the further security of the information it can also be stored in a paper

Explanation:

There are two types of inventory the hardware inventory and the software inventory the hardware inventory will contain the memory the operational system the details of the manufacturer and the software inventory will contain the details of the vendors of the application

The most important files are the documentation and they are stored in the log files and the codes are also stored

You might be interested in
Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
Sedbober [7]

Answer:

have a nice day! ❤❤

Explanation:

5 0
3 years ago
In a relational database application, a(n) ________ key is used to link one table with another.
mr_godi [17]

In a relational database application, a <u>foreign key</u> is used to link one table with another.

<h3>What is a foreign key?</h3>

In database management system (DBMS), a foreign key can be defined as a column whose value provides a link between the data that are stored in a table or relational database.

This ultimately implies that, a <u>foreign key</u> is used to link one table with another in a relational database application.

Read more on keys here: brainly.com/question/8131854

#SPJ12

6 0
2 years ago
What is an XML-based open standard for exchanging authentication and authorization information and is commonly used for web appl
nalin [4]

Answer:

SAML.

Explanation:

SAML seems to be an accessible standardized XML-based for some of the sharing of validation and verification details and has been generally implemented for the web apps and it seems to be a design that would be SSO. Verification data is shared via XML documentation which are securely signed. So, the following answer is correct according to the given scenario.

4 0
3 years ago
Which of the following guidelines about forwarding e-mail messages is most appropriate?
valentina_108 [34]
The last option: 

Avoid forwarding e-mail messages unless you have permission to do so.
5 0
3 years ago
Read 2 more answers
Define print_shape() to print the below shape. Example output:
ella [17]

The print_shape() is an illustration of Python function; whose execution is carried out when the function is called

<h3>The print_shape() function</h3>

The print_shape() function written in Python, where comments are used to explain each action is as follows:

#This defines the function

def print_shape():

   #The following iteration is repeated three times

   for i in range(3):

       #This prints the *** in each iteration

       print('***')

#This calls the function

print_shape()

Read more about Python functions at:

brainly.com/question/15745784

5 0
2 years ago
Other questions:
  • When you first start your computer, which software will have to start first?
    5·2 answers
  • Anybody good with Microsoft excel? I need help with this class.
    9·2 answers
  • What are data structures and algorithms? Why are they important to software developer?
    14·1 answer
  • What does Data storage enable a browser to do
    5·1 answer
  • 次のうち、ビジネスレターに適したフォントとポイントサイズの選択はどれですか?<br> 私を助けてください!私はあなたを最高にブランコにします!
    12·2 answers
  • What is the purpose of a career portfolio?
    6·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • ☢☢☢does anyone know how to do the TYNKER CANNON assignment ( lesson 2 intro to game design) I'll give BRANLIEST(¬‿¬)❤ dont answe
    11·2 answers
  • It is usually simple to delete old posts and online conversations if they make you look bad.
    5·1 answer
  • What were the social, political, cultural, or economic context in which the was invention made?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!