1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
7

Kenny needs to keep client information such as names and addresses. She should use a

Computers and Technology
2 answers:
Aneli [31]3 years ago
5 0
Folder!
They cost like 97. Cents
ivolga24 [154]3 years ago
4 0
She should backup the names and addresses onto the cloud, where it will be safe, unless there is a data breach.
You might be interested in
____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
Sati [7]
The Answer to this question is Web Bugs
8 0
3 years ago
¿El auto es un servicio tecnológico? / The car is a technological service?
EleoNora [17]
A car isn’t technological, It runs on gas. Hopes this helps :p
4 0
3 years ago
When making changes to existing font, the user must first _____.
Eva8 [605]

Answer:

select the font place the cursor in the paragraph choose the font color select the font dialog box.

Explanation:

6 0
3 years ago
Which document contains the dod cyber regulations for cui and cti??
ivolga24 [154]
<span>The question above has multiple answers you can choose from;

a. DFAS
b. FR-CI
c. DFARS
d. AR 25-2

The answer is (C) DFARS

On October 4, 2016, the Department of Defense issued a rule finalizing cyber reporting regulations. This rule was applicable to Department of Defense contractors and subcontractors. Notably, the final rule clarifies by CDI (covered defense information). This term is used in the DFARS (Defense Federal Acquisition Regulation Supplement). It defines CDI to include 4 categories; covered technical information (CTI); controlled unclassified information (CUI); operations security; export controlled information; and any other information identified or otherwise marked in the contract.</span>
7 0
3 years ago
When is it permissible to access non va websites for personal use using va computers?
antoniya [11.8K]

It is permissible only during one's break time or after a person is done with their duty hours and it is only for a short time and it is legal and also ethical.

<h3>What is a website?</h3>

This is known to be a form of is a composition of publicly accessible, interconnected Web pages that is known to often share a one domain name.

Based on the scenario above, It is permissible only during one's break time or after a person is done with their duty hours and it is only for a short time and it is legal and also ethical.

Learn more about websites from

brainly.com/question/13171394

#SPJ1

6 0
2 years ago
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Describe how one device can send a bit to another device.
    9·1 answer
  • ____ are programs that run independently and travel between computers and across networks.
    7·1 answer
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • as the new hr manager hired by a company to clean up some of the company's problems,analyse the system requirements for the comp
    14·1 answer
  • What is application software used for
    13·1 answer
  • A new object of type list is created for each recursive invocation of f.A. TrueB. False
    15·1 answer
  • What are the six command groups in powerpoint
    15·1 answer
  • Write a user input program that simulates a game of a rolling pair of dice. You can create/simulate rolling one die by choosing
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!