1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
3 years ago
15

Which one of the following pieces of information would be allowed as part of a limited data set?

Computers and Technology
1 answer:
Inessa05 [86]3 years ago
6 0
Phone number would be allowed
You might be interested in
Characteristics of first generation computers​
Marrrta [24]
* Main Electron a component- vacuum tube.

* Main memory- Magnetic drums and magnetic tapes.

* Programming language- Machine language.

* Power- Consume a lot of electricity and generate a lot of heat.

* were expensive to operate
5 0
2 years ago
Do you think it's better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
Alex787 [66]

Answer:

The young designer should use free open-source art programs for his designs. The designer can create new tools and get and update a verse collection of design tools in the software.

Explanation:

An open-source program is a software or application whose source code is available for changes, upgrade and sharing within the public.

Rather than in closed-source software where all upgrades and changes are made only by the tech-company with the license, and the expensive nature of the purchase, the open-source code programs are mostly free with a general public license.  

5 0
3 years ago
Which of the following uses replication to Infect multiple computers?
Nikolay [14]

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

3 0
2 years ago
Read 2 more answers
Anyone who play online game drop your name​
aleksley [76]

Answer:

kevinj720

Explanation:

4 0
2 years ago
A(n) ____________________ is a hardware device or software utility designed to intercept and prevent unauthorized access to a co
sesenic [268]

Answer:

hardware device

Explanation:

4 0
3 years ago
Other questions:
  • Knowledge flows from the information that has been generated. Which of the following does not necessarily flow from information
    15·1 answer
  • When transporting data from real-time applications, such as streaming audio and video, which field in the ipv4 header can be use
    14·1 answer
  • Many people keep time using a 24 hour clock (11 is 11am and 23 is 11pm, 0 is midnight). If it is currently 13 and you set your a
    10·1 answer
  • What is an online recommendation engine?
    12·1 answer
  • What is a computer?
    8·1 answer
  • What is sum after the following loop terminates? int sum = 0; int item = 0; do { item ; sum = item; if (sum > 4) break; } whi
    8·2 answers
  • Menus are attached to the windows by calling
    15·1 answer
  • Which of the following is a key difference between a Windows 7 restore point and one you set yourself?
    11·1 answer
  • Re:
    15·1 answer
  • Which two statements describe features of an ipv4 routing table on a router? (choose two.)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!