1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
7

Kenny needs to keep client information such as names and addresses. She should use a

Computers and Technology
2 answers:
Aneli [31]3 years ago
5 0
Folder!
They cost like 97. Cents
ivolga24 [154]3 years ago
4 0
She should backup the names and addresses onto the cloud, where it will be safe, unless there is a data breach.
You might be interested in
How did the invention of the printing press affect society?
MrMuchimi

Answer:

A. More people could influence the media of that time

Explanation:

Its immediate effect was that it spread information quickly and accurately. This helped create a wider literate reading public. However, its importance lay not just in how it spread information and opinions, but also in what sorts of information and opinions it was spreading.

8 0
2 years ago
A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
statuscvo [17]

Defining and assigning categories by the subject could be automated easily without incurring high costs or large amounts of time and effort.

One may create a straightforward algorithm to categorise the documents.Include every potential category in the algorithm.

Then, it would be simple to organise documents by subject, immediately backing up to a public cloud. Keeping corporate workloads on the public cloud involves duplicating resources.

As a fallback, using a service provider. selecting a backup solution that works between clouds (C2C). using online cloud backup services.

You should assess or evaluate these information sources once you have located information that satisfies the topic and criteria of your research. When you evaluate information, you are prompted to consider the authority, timeliness, point of view, and bias of various information sources.

Learn more about time and effort:

brainly.com/question/27670681

#SPJ4

6 0
2 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
What quantities are measured by the following sensors:
grigory [225]

Answer:

D

Explanation:

3 0
3 years ago
Other questions:
  • Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to gr
    15·1 answer
  • What is the most efficient way to include a space after each paragraph?
    13·2 answers
  • What is the Java source filename extension? What is the Java bytecode filename extension?
    14·1 answer
  • In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as wel
    7·1 answer
  • Given the network 192.168.100.0/24, we are going to segment this network into two subnets, Subnet A and Subnet B. The hosts requ
    10·1 answer
  • What outline feature can the Navigation pane browse the document by?
    14·2 answers
  • Scanning low allows you to locate __________ before you hit them
    13·1 answer
  • Join my among us code<br> SHUHZF
    6·2 answers
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • After Sally adds the Print Preview and Print command to the Quick Access Toolbar, which icon would she have added? the icon that
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!