1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
5

What can amber do to make sure no one else can access her document?

Computers and Technology
2 answers:
Lelu [443]3 years ago
7 0

Answer:

Amber needs to run with the document and hide it in a safe place so no one else can access her document:)

tigry1 [53]3 years ago
5 0
Amber can get a safe with a good password then hide the safe and nobody will access it, hope this helped :)
You might be interested in
Critical Thinking Questions
djyliett [7]

Answer:

Un lenguaje de programación es un lenguaje formal (o artificial, es decir, un lenguaje con ... Todo esto, a través de un lenguaje que intenta estar relativamente próximo al lenguaje ... Artículo principal: Historia de los lenguajes de programación ... cada una representando lenguajes de programación surgidos en una época ...

Explanation:

7 0
3 years ago
Read 2 more answers
Timing can be a major factor in the success of a business incorporation and emerging technology. Describe one potential problem
Serga [27]
The price could go up, it might not work then later down the road
5 0
3 years ago
Read 2 more answers
Imagine that you were hired to create the label for a new brand of soup. The client wants to emphasize that the soup has homemad
lidiya [134]

Answer:

Explanation:

For tools, I would simply use Adobe Photoshop to create the label/poster for the brand of soup. In order to make the poster or representation of the soup look homemade, I would place a picture of a kid drinking the soup at a kitchen table with a picture of the mom in the background kitchen. Then I would create a light yellowish tint in the image and steam coming from the soup bowl. This would help the brand represent a form of memory to a delicious homemade meal by a parent.

4 0
3 years ago
To bundle links together in order to improve bandwidth availability and redundancy, what protocol is used
Daniel [21]

Answer:

Link Aggregation Control Protocol

Explanation:

Link Aggregation Control Protocol can be used to assist in the formation of port channel bundles of physical links.

Link Aggregation Control Protocol is an IEEE standard defined in IEEE 802.3ad. LACP lets devices send Link Aggregation Control Protocol Data Units (LACPDUs) to each other to establish a link aggregation connection.

8 0
3 years ago
Imagine that you only used assignment statements for the design of the seven-segment display decoder. How would you obtain the B
Basile [38]

Answer:

Please see the attached file for the complete answer.

Explanation:

Download pdf
6 0
3 years ago
Other questions:
  • What will happen with communication methods in five years?
    8·1 answer
  • What does the picture indicate on the famous book “Dawn of the century”?​
    10·1 answer
  • Only Lysita knows the password for the question......
    10·1 answer
  • To give your app users the ability to open your app directly from other apps by clicking a link, you should use:.
    11·1 answer
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • What is technology? *
    10·1 answer
  • Hyper-Tech Enterprises manufactures mechanical parts used in air conditioning and heating units. The company employs over 300 wo
    13·1 answer
  • Name the application used for creating Presentations___
    5·2 answers
  • Write a program to prompt the user for hours worked to compute a gross pay for an employee, and he is paid 100/hour. If he worke
    7·1 answer
  • What is the computer system cycle called?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!