1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
8

What changes has Sue made so far? Check all that apply.

Computers and Technology
2 answers:
Alexus [3.1K]3 years ago
8 0

Answer:

Its C, E, and F

Explanation:

On edg

kicyunya [14]3 years ago
4 0
C, E, F on edge 2020
You might be interested in
What are two types of organizational structures designed to help an organization achieve its goals and objectives?
Fittoniya [83]

The answer is entrepreneurial and bureaucratic. Organizations that are large and small can achieve higher sales and other profit by properly matching their needs with the structure they use to operate.   the structure of an organization can help or hinder its progress toward accomplishing these goals and This are specific set up of organizations and ways to accomplish different goals. 

4 0
3 years ago
Read 2 more answers
Which layer of the osi model defines functions related to data delivery, error recovery, and flow control?
Dominik [7]
Answer is the Transport Layer.
5 0
3 years ago
Thomas came into work this morning and turned on his computer and nothing happened. He immediately called the help desk, and you
LenKa [72]

Answer:

A. Motherboard has failed.

C. Processor has gone bad or is not seated properly.

Explanation:

The computer system is a digital or electronic device, which comprises of an input device, output device, memory and storage device and a processor, all controlled by a software interface known as the operating system.

The hardware and software components are all integrated on a printed board known as a motherboard.

When the motherboard is faulty, the system looses it functionality and the screen stays off but the power supply indicator light stays on. This is also the same for the processor.

8 0
3 years ago
Which of the following describes the operating system
Marianna [84]

Answer:

Explanation:

you added no options

5 0
3 years ago
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
Other questions:
  • In this type of network, data is certain to reach its destination.
    7·1 answer
  • As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
    6·1 answer
  • on average, someone with a bachelor’s degree is estimated to earn _______ times more than someone with a high school diploma
    13·1 answer
  • A blank is a link on a web page that leads to another web page.
    14·1 answer
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • Which attribute defines the file name for the specific image in an image tag??
    13·1 answer
  • What java syntax allows me to take user input.
    11·1 answer
  • If you have two folders open on your desktop and you want to move a file from one folder to the other, simply ________ the file
    8·1 answer
  • 11:25
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!