1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

Sorry but, what are brainliest for?

Computers and Technology
2 answers:
Mandarinka [93]3 years ago
6 0

Answer:

they are for who gets the perfect answer that is correct. If you ask the question, you get to choose when there are two answers. But you can't choose if it is not your question.

Explanation:

hope this helps! :)

Advocard [28]3 years ago
5 0

Answer:

smartest and accurate answer

Explanation:

You might be interested in
2) What are two reasons we analyze algorithms?
Likurg_2 [28]
It’s a making sections about what algorithms to use
8 0
2 years ago
Read 2 more answers
Which of the following is NOT an example of written communication?
Veronika [31]

Answer:A conversation between co-workers

Explanation:

4 0
3 years ago
What's a big question or problem in the tech field you'd like to solve and why?
aleksandrvk [35]

A big question or problem in the tech field that i would like to solve is Data security.

<h3>What is Data security ?</h3>

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

  • data encryption
  • hashing
  • tokenization

Learn more about Data security at;

brainly.com/question/17493537

5 0
2 years ago
A computer has three main modules that have individual reliabilities of 0.77, 0.94, and 0.81. Because of recent failures, manage
Artemon [7]
Yo también necesito ayuda con esto:(
6 0
3 years ago
A router has a valid operating system and a configuration file stored in nvram. the configuration file contains an enable secret
Makovka662 [10]
The answer is user EXEC mode. This is for setting, viewing, and testing system processes. In common, the user EXEC commands let you to link to remote devices, modify terminal line settings on a temporary basis, perform basic tests, and list system information. This also used by common system administrators, while the privileged EXEC mode is used by the root administrator. Use the enable and disable instructions to shift between the two levels. Access to the user-level EXEC command line needs a valid password.
8 0
3 years ago
Other questions:
  • Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
    5·2 answers
  • In regards to storing folders the computer can be described as a ________________.
    7·1 answer
  • Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
    9·1 answer
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • Which function of a word processing program enables you to apply a preset formatting
    5·1 answer
  • The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effe
    14·1 answer
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • Why is drive of value when pursuing a career in IT?
    14·1 answer
  • Digital Media Equipment: Best Practices Quiz
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!