1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
3 years ago
11

If you want Nud3s add me on sc Kermit4lyfe1

Computers and Technology
2 answers:
san4es73 [151]3 years ago
6 0

Answer:

que pinga this is a hw website not snap

Explanation:

Brrunno [24]3 years ago
5 0
Bro are you okay umm
You might be interested in
Graphic software task​
seraphim [82]

Answer:

Graphic Designers

ProofHub as Project Management Tool. ProofHub is a versatile project management software for designers. ...

Jira. ...

Kanbanize. ...

Trello as Project Management Software for Graphic Designers. ...

Basecamp as Tool for Project Management. ...

Podio. ...

Asana. ...

Dropbox.

More items...•

7 0
3 years ago
¿Cuál es el objetivo principal de los servicios?
sleet_krkn [62]
Ayudar a las personas que los contratan
8 0
3 years ago
For computer forensics, ____________ is the task of collecting digital evidence from electronic media.
Zanzabum

For computer forensics, <u>data acquisition</u> is the task of collecting digital evidence from electronic media.

<h3>What is data acquisition?</h3>

Data acquisition is the process of gathering digital evidence from electronic media for computer forensics. Static acquisitions and live acquisitions are the two different categories of data acquisition.

You learn how to carry out static acquisitions from digital material in this chapter. It is the process of digitalization of data from the world.

Thus, <u>data acquisition</u> is the task of collecting digital evidence from electronic media.

To learn more about data acquisition, refer to the link:

brainly.com/question/28233320

#SPJ4

7 0
2 years ago
An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi
Nezavi [6.7K]

Answer:

C. Sending the data using public-key encryption

Explanation:

Encryption is the only choice that provides security.

6 0
3 years ago
Read 2 more answers
What does Pentium means?:/
netineya [11]
Pentium is just a brand of a CPU chips from Intel that is usually in your laptops or chromebooks. It's used for general purpose computing. Produced by Intel since 1993. 
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • Warm colors including red, yellow and orange _____________ be energetic and exciting to the eye, while cool colors in blue, gree
    11·1 answer
  • Which type of graph or chart measures
    15·2 answers
  • You want to configure two DHCP servers; one is running Windows Server 2012 R2, and the other is running Windows Server 2016. One
    9·1 answer
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • Lisa has a section of her document that she would like to include in the index. Which option should Lisa choose?
    12·1 answer
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • Fill in the blanks:
    15·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • Disuss the roles of hardware,software and databases in regard to computer based information systems
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!