1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
15

How do you answer questions

Computers and Technology
1 answer:
Vera_Pavlovna [14]3 years ago
7 0

Answer:

like this

Explanation:

<h3>you click answer and then<u><em> boom</em></u></h3>
You might be interested in
32.
ra1l [238]

Answer:

B.

Explanation:

If you are trying to save an existing document you would use the save command and you will be prompted if you want to rename it to what ever you wish

Hope this helps :)

3 0
2 years ago
Which of these definitions BEST explains what plagiarism is:
Alex777 [14]
To use another person's work without crediting the source.
6 0
3 years ago
Read 2 more answers
Technical colleges offer certification in audio engineering through programs that are normally from 2 to 6 months long.
Murrr4er [49]

Answer:

False

Explanation:

i said so

8 0
3 years ago
Sarah wants to calculate how much of a profit she would make on producing and selling a new product. Sarah should use a _____.
vagabundo [1.1K]
The answer is spreadsheet. I just did this lesson and I got all of the answers right so I know it's correct.
4 0
3 years ago
The advent of mobile systems run by Android and other operating systems opens a wide range of new system management and security
sergeinik [125]

Answer:

bring your own devices

Explanation:

"bring your own devices" paradigm is getting popular since organizations are increasingly allowing users to perform work tasks <em>on their own</em> personal devices, It is preferred because of the benefits and ease for the user. On the other hand, this paradigm opens several security risks.

For example processing sensitive data on personal devices creates risks in case of data recovery or if the device is stolen or lost.  

Additionally, <em>control and monitoring</em> of organizational data is harder when users allowed to work on their personal devices. Thus <em>data leakage</em> and <em>public exposure</em> can happen more easily.

7 0
2 years ago
Other questions:
  • Which is the last step in conducting a url research
    11·1 answer
  • Which best explains what a credit score represents
    10·2 answers
  • Which is a real-world example of a procedure?
    11·1 answer
  • You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcemen
    11·1 answer
  • You find that you are missing a very important file. After much searching, you have determined that it is no longer on your comp
    13·2 answers
  • Write a method named isNumericPalindrome that accepts an integer parameter named num. If num is a palindrome the method must ret
    6·1 answer
  • Karen works in a department store. Her coworker gave diverse cultural backgrounds. Which statement shows that Karen understand t
    14·1 answer
  • Life without internet points
    7·2 answers
  • 9. Which of the following is considered an interface? (1 point)
    11·1 answer
  • a 2x4 line decoder with enable is implemented using nand gate only. how many nand gate is needed to construct this line decoder?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!