1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
5

_______ requirements are courses that build knowledge and skills in a specific

Computers and Technology
1 answer:
snow_tiger [21]3 years ago
7 0
B. Specialization :))
You might be interested in
People often want to save money for a future purchase. You are writing a program to determine how much to save each week given t
GenaCL600 [577]
.................................
7 0
3 years ago
Read 2 more answers
What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
Tamiku [17]

Answer:

Option (b) Integrity

Explanation:

  • Data Integrity refers to the data which is not modified over the process, system.
  • Data Integrity here refers to which is not corrupted over the system in any way.
  • Throughout the life cycle of the process, system the data is intact and can be trusted for the future use.So, option (b) Integrity is the correct option.
  • Option (a) Confidentiality means the data that is kept secret, private but that doesn't mean it is not modified. So, option (a) confidentiality is wrong option.
  • Option (c) Authentication means the user is authenticated to use the data. It means the user has access to the data or not.So, option (c) is wrong option.
  • Option (d) Auditing means to examine, inspect a thing to find it fit for a purpose. Here, data auditing means verifying, inspecting,assessing the quality of data for a process.So, option (d) is wrong option.
3 0
3 years ago
1. Write the name of the tab, command group, and icon that is used to sort information in a Word document.
mixer [17]

<u>Answer</u>:

<em>It is possible to sort data in word. For doing this, you must have content in the form of list. </em>

<u>Explanation:</u>

<em>1. Select the text in numbered list / bulleted list </em>

<em>2. Click on the Home tab, Paragraph group, Click on Sort. You well get a Sort Text dialog box</em>

<em>3. In the dialog box , Click Paragraph, Text, Ascending / descending. So you can change the way it sorted by using the same dialog box whenever required. </em>

<em> In addition to sorting text, you can  sort date and also sort number. </em>

7 0
3 years ago
Read 2 more answers
A is a way for students to keep track of information during research
Ilya [14]
The choices are a) credible website B)search log c) Boolean operator d) online database.

The answer is, d. Online database. There are already numerous online digital tools that can aid research. Examples are readcube, mendeley, google scholar. It helps you save and organize researches as well as automatically give bibliographies according to your need like APA and MLA. These tools can hold and save different information that researchers need.
6 0
3 years ago
Linda moderates the comments section of an online travel magazine. Which type of comments should Linda flag or delete as inappro
kvv77 [185]
Generally, an online newspaper has a code of conduct for the comments accepted. Hate speech, racism, cursing, sexual comments or bigotry is usually not allowed. She may also want to be looking for spam comments such as links or ads where someone is trying to sell something from the comment section
8 0
3 years ago
Read 2 more answers
Other questions:
  • Margins can be modified in the page layout or by using__.
    15·1 answer
  • )1-bit sign, 8-bit exponent, 23-bit fraction and a bias of127 is used for ___________ Binary Floating PointRepresentation
    11·1 answer
  • If I put a short clip from a copyrighted video to Facebook and make it only viewable to friends, is that illegal?
    12·1 answer
  • How many different integers can be represented with a 4-digit number in base 13?
    8·1 answer
  • As a safe driver, you cannot, __________
    13·1 answer
  • Before creating a brief to design a product, what is needed
    8·1 answer
  • When classified data is sent over an unclassified network, what is this incident called?
    5·1 answer
  • What is not true of efs
    11·1 answer
  • What is the by stander effect
    9·1 answer
  • 17. Which of the following keyboard shortcut is used to copy the selected text?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!