1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
14

What is a scenario where records stored in a computer frequently need to be checked

Computers and Technology
2 answers:
vazorg [7]3 years ago
7 0

if your in  school and always are getting into trouble the school will always be checking your records


algol133 years ago
7 0
I would say the same thing as the first answer... you’re welcome
You might be interested in
How is sharepoint used in organization today?
tatyana61 [14]
<span>To build a team site and collaborate with your colleagues</span>
8 0
3 years ago
PowerPoint displays many that are varied and appealing and give you an excellent start at designing a presentation. However, you
Jet001 [13]

Answer:

The answer is themes.

Power point displays many <u>themes</u>

Explanation:

A power point theme is a combination of effects,fonts and colors that can be applied to the presentation.It makes the presentation more attractive and beautiful if used properly and smartly.Power point has built in themes that gives excellent start to your presentation.

5 0
3 years ago
Pleeeese help me for these questions
geniusboy [140]

1 Account

2 online

3 access

4 password

5 internet

6 email

4 0
3 years ago
A college student needs a laptop that can be used while committing on the train and sitting in a lecture
Westkost [7]
You could get a laptop for like 200 that could run well and enough space for stuff.
4 0
3 years ago
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
2 years ago
Other questions:
  • Cobbling together elements from the previous definition and whittling away the unnecessary bits leaves us with the following def
    7·1 answer
  • Create a new conditional format that applies yellow fill (fourth color under Standard Colors) and bold font to values that conta
    14·1 answer
  • g What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in
    10·2 answers
  • At the frequency of 2.4 GHz what is the free-space path loss in dB.
    9·1 answer
  • If you do not specify any criteria in a delete query, Access will delete all the records in the table. Truth or False
    11·1 answer
  • You can minimize the Ribbon with a command contained on the _____.
    7·1 answer
  • What year did the first hovercraft sail on water
    15·1 answer
  • Choose the term that matches each description.
    15·1 answer
  • GRAND THEFT AUTO 5 LOLLL
    15·2 answers
  • Andy works for a TV broadcasting company. He needs to set up a network covering a small area on the work floor. However, he noti
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!