1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
3 years ago
12

Creating an accurate inventory is a challenge, given the speed at which data files are created, deleted, moved, and changed. It

is therefore recommend that an organization prioritize the inventory of assets, starting with the least sensitive to most sensitive.True / False.
Computers and Technology
1 answer:
alina1380 [7]3 years ago
6 0

Answer:

False

Explanation:

Creating an accurate and perfect inventory doesn't have to be an issue. An organization doesn't need to start prioritizing inventory creation from the least sensitive to the most sensitive, rather inventory asset should be stored with specification of its name.

This been done will enable for easier assessing and not mistakenly deleting a need inventory from the. database.

A well structured inventory database is one which its information is retrieved easily.

You might be interested in
Help please!! worth 10 pts! answer quick please!
WINSTONCH [101]

Answer:

it has helped the people of today by

1.helped the young generation with there homework

2.you can book an hotel through the internet

3.you can also book a plane ticket via the internet

4.it is easier to look to ur email message via the internet

4 0
3 years ago
6. The following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is th
ryzh [129]

Answer:

Explanation:

a) taking 00000005, it is a 13th bit which is 0, and therefore, we'd call it an ordered chunk

b) taking 00000005 again, it is 14th (B) and 15th (E) bits are 0 and so we'd call it a middle fragment

c) 00000015 is equal to 21, it is not a multiple of 4, and as such, it needs 3 padding bytes

d) 00000005 is equal to 5 making it a TSN. So the TSN is 5

e) taking 0003, we can then say the SI is 3

f) taking 000A, the SSN is then 10

g) the message is 48656C6C

6 0
3 years ago
Select the correct answer. Cerise is explaining computer viruses to her students. What is the best way for her to explain a comp
Anna [14]

Answer:

B. it is a code that creates multiple copies on loading and damages the system

Explanation:

it is a app which they send to you on your computer or mobile phone

maybe click this link you will get free gift

3 0
3 years ago
Pick the correct statements regarding cell references.
shusha [124]

Statement two and three is correct.

Statement 1 is incorrect. A relative reference changes when a formula is copied to another cell while Absolute references remain constant. However, it is safe to say that an absolute address can be preceded by a $ sign before both the row and the column values. It is designated by the addition of a dollar sign either before the column reference, the row reference, or both. Statement C is also correct. A mixed reference is a combination of relative and absolute reference and the formula (= A1 + $B$2) is an example of a mixed cell reference.

7 0
3 years ago
Read 2 more answers
Who is the father of computer​
Irina-Kira [14]

Answer:

Charles babbage is the father of computer

5 0
3 years ago
Other questions:
  • According to the article in WikiAnswers, digital communication systems have more benefits than analog systems. They are faster a
    10·2 answers
  • A company is a Microsoft 365 reseller. The company does not provide managed services or direct customer support. You need to pro
    10·1 answer
  • Um can anyone who is really into science and physics answer this question
    7·1 answer
  • Which of the following methods for learning to use new software includes tips for using the product, updates to download, and in
    7·2 answers
  • PLEASE ANSWER THIS IM IN A QUIZ
    15·2 answers
  • Similarities between inline css and internal css​
    6·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • How was kapilvastu named​
    11·1 answer
  • The ______ Works on a single variable or constant. *​
    8·1 answer
  • ¿Cuál es la capacidad pulmonar del hombre y la mujer?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!