1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
9

Help plzzzz_________ provide a means of organizing and summarizing data A. Reports B. Metadata C. Connectors D. All

Computers and Technology
1 answer:
storchak [24]3 years ago
8 0

Answer:

that is technical but I will go with all I mean d

You might be interested in
Elvis has asked Bonnie out on a date to a baseball game. Elvis is a friend of Bonnie's classmate Ginger and she has met him a fe
valentina_108 [34]
My opinion a background check and take another friend with you.
4 0
3 years ago
Read 2 more answers
Your traffic light changes to yellow as you approach an intersection. In most cases, what action should you take?
mamaluj [8]
Make every reasonable effort to stop.
6 0
3 years ago
Read 2 more answers
which of these tools stick to the edge of an image, thus making it easy to select the shape of an image
USPshnik [31]

Answer:

ljb lih lug outbpiyougvotvoy

outiyfiyfiyfiyffiyvitfurcutfcutcrcutfutcdu

Explanation:

didn't understand the question

3 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Which are the best examples of cost that should be considered when creating a project budget
sashaice [31]

Explanation:

how much the project will cost

5 0
3 years ago
Other questions:
  • You want to place a video from the internet to your desktop. what process do you use?
    15·1 answer
  • What is technology addiction​
    14·1 answer
  • Assume that the array monthSales of integers has already been declared and that its elements contain sales data for the 12 month
    13·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • A keyboard and touch screen are the most common of ________ devices. select one:
    11·1 answer
  • HP laptop computers are produced on a line, with multiple workers completing one or two specific tasks to assemble the laptop. T
    15·1 answer
  • What is the purpose of a Post Mortem Review? (5 points)
    5·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!