1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
5

What can amber do to make sure no one else can access her document?

Computers and Technology
2 answers:
Lelu [443]3 years ago
7 0

Answer:

Amber needs to run with the document and hide it in a safe place so no one else can access her document:)

tigry1 [53]3 years ago
5 0
Amber can get a safe with a good password then hide the safe and nobody will access it, hope this helped :)
You might be interested in
What are 6 external parts or perpherals of a computer system and identify output from input devices.
n200080 [17]
40. External Peripherals of a Computer systems are the following: -> Keyboard – this is an input device -> Mouse – This is an input device also -> Printer – this is an output device -> Flashdrive – This is a storage device -> Monitor – this is an output device -> external hard drive – this is a storage device Output device are those devices that communicate the results of the data processing to the user Input device are those device that communicate the results of the data processing to the computer system Storage device are those device that stores data.
4 0
3 years ago
Discuss whether design considerations need to change for each kind of computer users. support your answer with an example.
vaieri [72.5K]
Each kind of computer users have different knowledge, needs and requirements. For example there is a difference between the computer knowledge of developers and users without <span>technical experience. Because of this, but also why they need and use computers, and what tools they need, design consideration need to change for each kind of computer users.</span>
<span>
</span>
8 0
3 years ago
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
ad-work [718]

Answer:

encryption

Explanation:

A(n) encryption   virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

5 0
3 years ago
In which patten the modern computer work ?​
Vaselesa [24]

Answer:

Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.

4 0
3 years ago
In the Start menu of Windows 7, you see your name listed as an option. Where does this shortcut lead if you select it?
Ksenya-84 [330]
<span>C. Your user account properties 
I think</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which one of the following parts of a universal motor does not move? A. The armature B. The field coil C. The shaft D. The commu
    5·1 answer
  • Write a program that asks the user to input
    11·1 answer
  • Describe five different ways databases can be processed
    14·1 answer
  • Microsoft Word
    15·2 answers
  • The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per
    7·2 answers
  • Select the correct answer.
    9·2 answers
  • 3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
    13·1 answer
  • Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod
    9·1 answer
  • Cuáles eran las condiciones de vida de las mujeres durante el renacimiento perduran​
    14·1 answer
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!