1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
3 years ago
15

What should you always do to clean off tables

Computers and Technology
2 answers:
ikadub [295]3 years ago
7 0
Wipe then off then spray them down then wipe off again
NNADVOKAT [17]3 years ago
5 0
Clean them, dirty them, repeat.
You might be interested in
Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
zmey [24]

Answer:

boss is not an os

Explanation:

boss is a former of Linux hope this helped

5 0
3 years ago
Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
SVEN [57.7K]

ALTER TABLE customer ADD CONSTRAINT customer_number_unique UNIQUE (customer_number);

5 0
2 years ago
Como se diz saia em inglês​
Montano1993 [528]

Answer:

I believe the translation would be "get out", but I'm not sure.

Explanation:

4 0
3 years ago
Read 2 more answers
How does Botnet operate and communicate.
zhuklara [117]

Answer:

 Botnet is typically operate by the internet relay networking and domain. The botnet are generally received specific type of the instruction from the control server.

The main purpose and structure of botnet is basically depend upon the various type of instruction and structure.

The botnet is communicated with the help of IRC ( Internet relay chat) and it is basically communicated with the chat server for transferring the data to the client. The IRC network basically use simple network with low bandwidth for communication with the host of the botnet.

4 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Other questions:
  • Reading is the process of transferring data, instructions, and information from memory to a storage medium.
    15·1 answer
  • What is an individual piece of data called in a database? coding A field B file C record or D tittle
    9·1 answer
  • Sonora wants to extend the cells to be added in her formula. what is the quickest way to add more sells?
    10·2 answers
  • Study the sentences below. A.Changing the properties of characters in a sentence or paragraph in a Word document helps increase
    5·2 answers
  • What is the function of the &lt; !Doctype &gt; tag?
    12·2 answers
  • What is dialog box? ​
    7·1 answer
  • Is the address 7b invalid regarding cell references?
    8·1 answer
  • ______ provide visual representations of the options available for a given command
    7·1 answer
  • AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
    12·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!