1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
11

HELP PLS TIME LIMIT HERE

Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
7 0
I do it immediately, so it don’t effect my assignments or grades.
You might be interested in
Question 1 Excel is a tool used to A create a spreadsheet B design a brochure C make a presentation D write a letter
aev [14]

Q1- it is A: Create a spreadsheet


8 0
3 years ago
Which of the following is an example of an inline element? A. B. C. D.
____ [38]
what are the answers??
3 0
2 years ago
What types of computers where made in the 2000s?
Margarita [4]

Answer:

Mac was made in 2000!!!!!!!!

6 0
2 years ago
________ can include computer viruses, trojan horse programs, worms, exploit scripts, and toolkits
Volgvan
All threats can include computer viruses, Trojan horse program, worms, exploit scripts and toolkit.
<span />
4 0
3 years ago
Privacy concerns, financial information, security of your personal data has
Bas_tet [7]

Answer:

Explanation:

Data security is the process of protecting your most critical business assets (your data) against unauthorized or unwanted use.

This not only involves deploying the right data security products, but also combining people and processes with the technology you choose to protect data throughout its lifecycle. Enterprise data protection is a team sport.

Best practices for effective data security include taking a risk-based approach to protecting data, using a unified platform that integrates data security information across your entire enterprise and ensuring scalability across environments of any size across public cloud, on-premises and hybrid cloud deployments.

5 0
3 years ago
Other questions:
  • A good reference point for determining the position of a line or curb in front of you is your __________ . A. Hood ornament B. L
    10·1 answer
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • To save the changes to the layout of a table, click the Save button on the _____.
    13·1 answer
  • Which wireless technology has a typical transfer rate of 1 Mbps to 3 Mbps at distances up to about 10 meters?
    7·1 answer
  • A person clicks on an ad of a fitness club in a blog on nutrition. The person conducts a search on yoga and moves to another web
    8·1 answer
  • Drag each label to the correct location on the image.
    10·1 answer
  • Self contained sequences of actions to be performed are?
    6·1 answer
  • Which line in the following program will cause a compiler error?
    9·1 answer
  • So I was looking at my profile and it says i'm a brainly PLUS member didn't sign up for it tho. Any ideas why this could have ha
    14·2 answers
  • Write a python program to calculate the length of any string recursively​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!