1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
8

Does anyone know the answers?

Computers and Technology
1 answer:
frez [133]3 years ago
4 0

Answer: nah bruh sorry

Explanation:

You might be interested in
When santo is formatting the text in his wordart text box, he discovers that by default the text box is formatted with _______ t
Rina8888 [55]
<span>When Santo is formatting the text in his Wordart text box, he discovers that by default the text box is formatted with In Line With Text text wrapping. In order to change the text wrapping you should click the File Tab, then Word Options and then Advanced.

</span>
4 0
4 years ago
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
Zigmanuir [339]

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

6 0
4 years ago
Select all that apply.
Leto [7]
You may do all of the given options.
Thank You!
8 0
4 years ago
The ping command uses the most basic interior routing protocol on the internet which is the:
Nesterboy [21]
Routing Information Protocol (RIP)
5 0
3 years ago
The practice of gaining unauthorized access to a bluetooth device is referred to as:
jok3333 [9.3K]
BlueJacking. It is unclear if the term jack refers to pranking or to hijacking.
6 0
4 years ago
Other questions:
  • Which element in Access is an ideal data source?
    12·2 answers
  • 30 POINTS!!
    15·2 answers
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • When people take a image on their phone how can they copy the image into google docs.
    6·2 answers
  • Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supporte
    6·1 answer
  • • Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment a
    5·1 answer
  • Написати лабараторну, на тему:Вивчення властивостей та застосування шаруватих пластиків та кермаміки
    13·1 answer
  • Who is your favorite XC2 character, and why?
    15·1 answer
  • Which of the following types of tasks are comparatively easy for artificial intelligent systems?
    13·1 answer
  • The Home editions of Windows 7 do not include the Local Security Policy or Print Management.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!