1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
5

I will literally brain list if u answer this question

Computers and Technology
1 answer:
Vsevolod [243]3 years ago
6 0

Hey it’s Ctrl I think


You might be interested in
Why should you delete files from your computer? (multiple answers can be chosen)
Morgarella [4.7K]
<span>to increase the computer's efficiency

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount

hope this helps</span>
5 0
4 years ago
Read 2 more answers
. What type of device is a computer? Where does it use?​
LenKa [72]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Computer is an electronic and digital device. Computer can be used everywhere in our daily life. You can use a computer to search for something over the internet related to your study etc.

The following fields where you can see the use of computers.

  1. Education
  2. Business
  3. Hospital
  4. Banking sector
  5. Home
  6. Marketing
  7. Government offices
  8. etc

You can see the use of computers everywhere in our daily life.

7 0
3 years ago
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
How to stop getting emails from colleges?
Nana76 [90]
Click the Manage My College Board Email Subscriptions link located at the bottom of the email.

You are taken to a new page.

Check or uncheck the boxes next to the emails you want to subscribe or unsubscribe to.

Click Submit in the bottom right-hand corner of the page.

You will receive an email confirmation of your subscription changes.

7 0
3 years ago
What gaming PC should I get
zhuklara [117]

Answer:

ps5

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
    12·1 answer
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • Is this a Bad Cpu processor ? I need some.help ASAP I turn on my.pc and it has no display but everything is on fans and the you
    13·1 answer
  • Which of the following is true regarding a class and interface types? Group of answer choices You can convert from a class type
    9·1 answer
  • You are running out of storage space on one of your servers. you need to purchase an external hard drive, as there are no drive
    8·2 answers
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • You want to use a terminal program to terminal into a cisco router. what protocol should i use
    8·1 answer
  • Please answer me <br> in Assignment - Algorithms
    10·1 answer
  • Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
    12·1 answer
  • 2.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!