1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
7

Your sister is starting 9th grade next year and is thinking about going to college. What step would you recommend she take first

?
Computers and Technology
2 answers:
lozanna [386]3 years ago
5 0

think about what she wants to do with her life and what collage is best fit for that


Romashka [77]3 years ago
3 0
She should make sure she is going to get all her credits done by the next 4 years :)
You might be interested in
Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
ahrayia [7]
To lock multiple rows (starting with row 1), select the row below the last row you want frozen, choose the View tab, and then click Freeze Panes. To lock multiple columns, select the column to the right of the last column you want frozen, choose the View tab, and then click Freeze Panes<span>.


I hope my answer has come to your help. Thank you for posting your question here in Brainly. We hope to answer more of your questions and inquiries soon. Have a nice day ahead!
</span>
4 0
4 years ago
Read 2 more answers
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
Which of the following is a malicious program that can replicate and spread from computer to computer?
Marina CMI [18]
An email, duh!

lol j.k def not email, it is a virus.

a trick to remembering this is that a virus can make you and computer sick. 

5 0
4 years ago
Read 2 more answers
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Why should you evaluate trends when thinking about a career path?
Vladimir [108]

Because trends can show data in relation to what career is on the rise in terms of wages, statistics show patterns that you can observe to find the career which is becoming popular and most beneficial.  

3 0
4 years ago
Other questions:
  • What are the five steps of ethical hacking?
    15·1 answer
  • Write a method called evenBeforeOdd that accepts an array of integers and rearranges its elements so that all even values appear
    15·1 answer
  • Write a program which will use a template version of search function(4 points): Randomly generate a list of 100 integers(1 point
    11·1 answer
  • When creating a mail merge, you must insert all of the items from your data source into your merged document. Truth or false ?
    6·2 answers
  • The statement x++;
    11·1 answer
  • Write two recursive versions of the function minInArray. The function will be given a sequence of elements and should return the
    8·1 answer
  • In which scenario would you view Word data in Excel?
    11·1 answer
  • Date Class Constructor – assigns fields to appropriate formal parameter – using the setters so error checking will occur. The co
    6·1 answer
  • Rate my dog out of ten give explanation why
    12·1 answer
  • Which ribbon tab is home to the Function library used to insert functions into worksheets?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!