1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
14

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Computers and Technology
1 answer:
Eduardwww [97]3 years ago
7 0

Answer:

The National Security Agency. Hope this helps! PLEASE GIVE ME BRAINLIEST!!!!! =)

You might be interested in
Why ads on this app do it help pay for the free stuff?
UNO [17]

Answer:

Yes

Explanation:

The ads help support the system for you using this website for free.

4 0
2 years ago
Determine if x(t) is periodic and determine the fundamental period.
Studentka2010 [4]

Answer:

hdiihgguilmjj jduhuiuedoibb

6 0
4 years ago
Sharing private information causing a person to be humiliated is considered to be doxing. T or F
sergij07 [2.7K]

Answer:

T

Explanation:

Doxing:

search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.

i would say it matches the definition

8 0
2 years ago
Which phrases suggest that Bob is a web administrator?
aliina [53]

"creates a weekly backup from a remote web server"

This implies that he is the owner of the server since, one, he backs it up every week, and two, he has access to create a backup.

3 0
3 years ago
Part B - Find the solutions for the following Case Study Real World Problems by applying the appropriate concepts that you learn
Monica [59]

Answer:

ok very surprised to hear that

5 0
3 years ago
Other questions:
  • What is the most important part of the course that you have learned about so far?
    11·2 answers
  • A group of computers that are interconnected in order to share information or documents is called a _____
    9·1 answer
  • If an administrator wanted to change the IP configuration settings on the first Ethernet interface to 10.1.1.1 and the netmask t
    12·1 answer
  • Developers and organizations all around the world leverage ______ extensively.
    9·2 answers
  • Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
    11·1 answer
  • What program is best for teaching young people code?
    13·1 answer
  • What function key is used to enable the spelling and grammar function
    14·1 answer
  • A major retailer wants to enhance their customer experience and reduce losses
    9·1 answer
  • Plz show working for binary addition. please solve. 11000 + 110101 + 101011​​
    15·2 answers
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!