1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
5

What can amber do to make sure no one else can access her document?

Computers and Technology
2 answers:
Lelu [443]3 years ago
7 0

Answer:

Amber needs to run with the document and hide it in a safe place so no one else can access her document:)

tigry1 [53]3 years ago
5 0
Amber can get a safe with a good password then hide the safe and nobody will access it, hope this helped :)
You might be interested in
Bob has 2 candy bars he is fat what hapennes
Llana [10]

Answer:

he eats The candy Bar

Explanation:

I think cause As You told he is fat He might like sugary items

3 0
3 years ago
Read 2 more answers
A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer w
Leviafan [203]
Virus










-----------------------------------
5 0
3 years ago
You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?
mars1129 [50]
Was this a question on an assignment or are you in an asylum right now
3 0
3 years ago
Read 2 more answers
Question 1 of 5
saveliy_v [14]
B) each person gets to contribute in their own unique way
8 0
3 years ago
Read 2 more answers
PLZ HELP!!!
mariarad [96]
Answer: A. Usability testing
Explanation:
Usability testing would be the correct answer because if the user interface isn't "frendly" then people won't be able to use it properly. Or if you are refering to the word friendly as looking safe, then even more so would be usability testing. Because if people don't like the fonts and styles of the user interface, they might not use it at all.
8 0
3 years ago
Other questions:
  • The purpose of hazard lights is to
    7·2 answers
  • What is virtual reality?
    10·1 answer
  • Most smartphones use operating systems developed by ________. Select one: A. Symbian and Apple B. Apple and Microsoft C. Microso
    13·1 answer
  • When was kale discovered?
    9·1 answer
  • What is something that can be done to help stop teen teen crashes
    8·1 answer
  • Describe the procedure for creating a table or spreadsheet in a presentation slide.
    13·1 answer
  • Jonathan works with a team of graphic designers. They have a collection of images and have divided the image editing work among
    5·2 answers
  • Lucia is using the American Psychological Association (APA) style guidelines to writer her research paper. What is her most like
    5·2 answers
  • When working in outline mode, press __________ and click the eye icon to change only one layer back to preview mode.
    10·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!