1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sp2606 [1]
3 years ago
9

Write an abbreviation for the following:

Computers and Technology
2 answers:
Aleks [24]3 years ago
5 0
C.H.O.I.N, Colorado, Hawaii, Oklahoma, Illinois, New York.
AURORKA [14]3 years ago
4 0

CHOIN

Colorado, Hawaii, Oklahoma, Illinois, New York    

Cat House On Indigo Nightstand    

You might be interested in
Which of these problems is correct if the numbers are binary numbers?Group of answer choices1 + 1 = 21 + 1 = 100 + 0 = 11 + 0 =
Vinvika [58]

Answer:

The last one is correct.  

Explanation:

6 0
2 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
People are still buying printed magazines?
BARSIC [14]
Yes, they are. 
Mostly dentists' offices, though.  
3 0
3 years ago
Why did industrial revolution begin Britain?​
allochka39001 [22]

Answer:

Britain also happened to have a wealth of coal, iron, and other resources in a relatively small area, which would help kick-start the Industrial Revolution. Its growing Colonial Empire also provided a ready-made (and captive) market for surplus goods, providing further impetus for entrepreneurs and new industrialists

7 0
1 year ago
Read 2 more answers
In powerpoint a point is _____ of an inch in height.
USPshnik [31]
 a fraction

I think it is correct.

Hopefully it helps.
6 0
3 years ago
Other questions:
  • What is <br> Warehouse schema.
    14·1 answer
  • Write a function similar to keep_ints like before, but now it takes in a number n and returns a function that has one parameter
    8·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • Gap junctions and plasmodesmata have what feature in common?
    6·1 answer
  • Writе thе dеclaration of a doublе pointеr namеd avеragе
    10·1 answer
  • What is the safest way to shut down a desktop or laptop computer?
    8·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • Which is true about lists and stacks?
    8·1 answer
  • 7.) Title text boxes on every slide must be the same format. <br> A. True <br> B. False
    15·2 answers
  • What are node in a computer network​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!