1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
10

How do the search methods differ for primary and secondary data?

Computers and Technology
2 answers:
PilotLPTM [1.2K]3 years ago
6 0
My senses lead to A.
viktelen [127]3 years ago
5 0

Answer:

The answer is <u>D</u>

These data use the same processes.

You might be interested in
Decrypt this message: P ht uva h zwf
KatRina [158]
Translation: I am a spy
5 0
2 years ago
To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. TRUE
Elis [28]
I believe the statement is true. <span>To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph. Hope this answers the question. Have a nice day. Feel free to ask more questions.</span>
6 0
2 years ago
What is the difference between margin and padding property?
VMariaS [17]

Answer:

Margin is applied to the outside of your element hence affecting how far your element is away from other elements.

Padding is applied to the inside of your element hence affecting how far your element's content is away from the border.

Explanation:

Hope it helps!!!

6 0
1 year ago
When using social​ media, make sure to provide access to all the information needed to accurately process messages by following
Nataly_w [17]

Answer:

Option E i.e., transparency is the correct option.

Explanation:

When any person using social media networks the he always ensure that he gives all the information related accurately about himself because in the social media network there is the transparency of everything except his chat with other but any person get details of the other person only if he is using social media network.

4 0
3 years ago
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Other questions:
  • Which of the following tasks is least effective at preventing a computer virus?
    14·2 answers
  • For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
    11·1 answer
  • Variables in PHP must begin with what symbol?
    11·1 answer
  • You find that you are missing a very important file. After much searching, you have determined that it is no longer on your comp
    13·2 answers
  • Insert a function in cell g5 to calculate the first student's monthly payment, using appropriate relative and absolute cell refe
    13·1 answer
  • Which is a good guideline to follow when choosing a background for your slides?. . A. Use a different background for each slide.
    8·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • A(n) _______________ is a network organization that centralizes user accounts, passwords, and access to resources.
    7·1 answer
  • Convert 12 bits to bytes​
    13·1 answer
  • A wireless ________ extender is a network device that enhances transmission of your wireless signal.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!