1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
2 years ago
12

A(n) __________ is a server with the original copy of the data that others need.

Computers and Technology
1 answer:
Paha777 [63]2 years ago
8 0
A documment is a server with the original copy of the data that others need.
You might be interested in
Wich type of operating system is usually used in personal computers
Anvisha [2.4K]
The three most common operating systems for personal computers are Microsoft Windows, Apple Mac OS X, and Linux.
4 0
3 years ago
Read 2 more answers
Identify the sampling technique used:A lobbyist for a major airspace firm assigns a number to each legislator and then uses a co
trapecia [35]

Answer:

Random Sampling

Explanation:

Random Sampling technique is being used in the given scenario.

3 0
3 years ago
A picture drawn in 3 d is called?​
Varvara68 [4.7K]

Answer:

autostereogram

Explanation:

that^

6 0
3 years ago
Read 2 more answers
When someone asks, Is this information specific enough?, he or she is interested in more _____.
AVprozaik [17]

Answer:

precision

Explanation:

In simple English precise means exact or something specific

5 0
3 years ago
Read 2 more answers
Name three actions you should take if you believe you’ve been victimized by crimeware or online fraud
allochka39001 [22]

Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)  

4 0
3 years ago
Read 2 more answers
Other questions:
  • Using the expected format, of putting key information where the reader can’t find it, is an example of?
    8·2 answers
  • What is required to control access to the file system using file and folder permissions on a windows based computer?
    8·1 answer
  • What process combines data from a list with the content of a document to provide personalized documents?
    9·2 answers
  • Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
    12·1 answer
  • Which increases the rate of soil formation?
    10·1 answer
  • is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members a
    14·1 answer
  • You have to cut a wood stick into pieces. The most affordable company, The Analog Cutting Machinery, Inc. (ACM), charges money a
    10·1 answer
  • 1. Fill in the blanks:
    7·1 answer
  • Mechanisms that can be used to rescue accident victims
    11·1 answer
  • Answer the following 8-mark question in your book.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!