1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
11

It is necessary tto save updates often when working in google docs? True or false

Computers and Technology
2 answers:
borishaifa [10]3 years ago
7 0
True cause sometimes it can delete all ur work
kiruha [24]3 years ago
7 0

Answer:

false

Explanation:

You might be interested in
Given the following schedule, show the locks that will occur and the subsequent schedule. Assume that strict 2PL is in effect, w
Alexxandr [17]

Answer:

see explaination

Explanation:

Please kindly check attachment for the step by step solution of the given problem

4 0
3 years ago
The primary function of a __________ is to translate the URL or web address a user enters in a web browser, into the correct cor
Mnenie [13.5K]
The primary function of a " Domain name server (DNS" is to translate the URL or web address a user enters in a web browser, into the correct corresponding IP address.
8 0
3 years ago
In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
Tcecarenko [31]

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

4 0
3 years ago
Which phone has the most GB (Gigo Bites)<br><br>A.Samsung<br>B.Iphone<br>C.LG<br>D.ZTE
Lina20 [59]
It's GigaBytes actually. And is it RAM or storage capabilities?

And also those are brands. Not models. For example, Samsung has different phones. Not just one.


7 0
3 years ago
Read 2 more answers
True or false :Beyond fulfilling legal obligations, a diverse workplace offers many other benefits as well.
KengaRu [80]
The answer to your question is true.
7 0
3 years ago
Other questions:
  • The program prompts the user to interactively enter eight batting averages, which the program stores in an array. The program sh
    9·1 answer
  • Assume that the following code segment C is executed on a pipelined architecture that will cause data hazard(s): Code segment C:
    9·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
    5·1 answer
  • What is the financial aspect for a business as to what database software they will buy?
    6·1 answer
  • The database must be carefully planned to allow useful data manipulation and report generation.
    10·1 answer
  • This is a program that calculates information about orders of shirts and pants. All orders have a quantity and a color. Write a
    7·1 answer
  • The _____ of a local variable is the function in which the variable is created.
    6·1 answer
  • All of the following are examples of hardware, except:
    13·2 answers
  • What are your considerations in making a derivative ict content ti effectively communicate or present data or information?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!