1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
11

Let's go! About to hit 40k!!! Glad to help on Brainly®!!!

Computers and Technology
1 answer:
Katarina [22]3 years ago
5 0

GJ! Keep up the good work!

You might be interested in
Call 334-399-4201 to annoyed my mom
yaroslaw [1]

Answer: why...

Explanation:

3 0
4 years ago
What does the windows update feature allow you to do?
Mariulka [41]
The answer is D
Explanation: none
3 0
3 years ago
Read 2 more answers
How to keep tools and equipment safeuh​
ivanzaharov [21]

Answer:

Use pelican, or similar heavy duty cases

Explanation:

Pelican is a brand btw. 10/10 would recommend

8 0
3 years ago
Read 2 more answers
What file name would allow you to easily find and edit your document later in Word Online?
DIA [1.3K]
The first one “ jane_essay 2_24_21 “
6 0
3 years ago
Read 2 more answers
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
4 years ago
Other questions:
  • Research the disadvantages of the computer and explain them.​
    15·1 answer
  • A ______ connection provides fast internet service and the ability to exchange large files. ​
    11·1 answer
  • If you can log nto a website to add, edit, or delete content that has been added by you or another user , you are most likley us
    8·1 answer
  • Write a function flush that takes as input a list of five cards, tests whether it is a flush (Note: straight flush is not a flus
    11·1 answer
  • Do you think our attitude (whether positive or negative) is something we are born with or that we have power to control within o
    5·2 answers
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • Why computer literacy is vital to access in business work
    7·1 answer
  • What is destination email address​
    8·1 answer
  • What is an advantage of using a dynamic hard drive in a vm?
    10·1 answer
  • The term used to describe whereby old and new media are available via the integration of personal computers and high speed satel
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!