1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
3 years ago
9

You can encrypt individual files, but microsoft recommends encrypting at what level?

Computers and Technology
1 answer:
vichka [17]3 years ago
4 0
Microsoft recommends encrypting at the folder level.
You might be interested in
A(n) ________ is a program that takes advantage of very low-level operating system functions to hide itself from all but the mos
Rufina [12.5K]

Answer:

a rootkit is a program that takes advantage of very low-level operating system functions

Explanation:

6 0
2 years ago
An effective problem statement ensures that
swat32
The software design effectively addresses the issues
6 0
3 years ago
Write an if statement to test if a number stored in y is between 6 and 10 inclusive.
lana66690 [7]

y = choose whatever number you want.

if 5 < y < 11:

   print("The value stored in y is between 6 and 10 inclusive")

else:

   print("The value stored in y is not between 6 and 10 inclusive.")

I hope this helps!

8 0
2 years ago
Rita used information from a blog that someone else wrote. What should she do?
Shkiper50 [21]

Answer:

rita should either ask the original author for permission to use her blog, but the best answer woyuld be that she should site her sources.

Explanation:

7 0
2 years ago
Guys how do i add or insert a diagram for similarities on google docs.
Vikki [24]
Usually I go to the Photos and I find a photo that already had the diagram
7 0
3 years ago
Other questions:
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • All of the following except one are issues that should be covered in an AUP. Which one is the exception?
    5·1 answer
  • What is the synonym for term port?
    9·1 answer
  • What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
    6·2 answers
  • Why is it a mistake to put email addresses of people who don't know each other in the "To:" field?
    8·2 answers
  • When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the
    6·2 answers
  • This is the term for the manual process of editing strips of the film before digital editing was created. The term is still used
    9·1 answer
  • Which country was the first in the world to launch a mass media campaign in response to population growth?
    14·1 answer
  • A personal computer (pc) or ____ is a small computer system designed to be used by one person at a time.
    12·1 answer
  • PLZ HELP What will be the output? class num: def init (self.a): self. number = a mul* __(self. b) return self. number + b. numbe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!