1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
11

What would be some long- term goals.

Computers and Technology
1 answer:
sergiy2304 [10]3 years ago
8 0

Answer:

<h2>6 and 8 because those is what is likely to be ling term goals if your under 16</h2>
You might be interested in
So this is what i use to code and all of that
givi [52]

Answer: yeah!

Explanation:

Have a good day!

5 0
3 years ago
Example 4-1: The styles for the main content of an HTML document main { clear: left; } main h1 { font-size: 170%; } main h2 { fo
jek_recluse [69]

Answer:

The clear property stops floating of the main element to the right of the preceding block elements

Explanation:

The clear property specifies that which sides of the elements floating element are not allowed to be float.

It returns or sets the positions of an element in relation to the floating objects. If an element can be fitted horizontally in space next to other elements which is floated.

Syntax:

clear: none | left | right | both | initial;

6 0
3 years ago
Cloud Kicks is undergoing a GDPR-focused implementation to ensure access to personal information data is limited to only users w
bija089 [108]

Answer:

Option A.

Explanation:

It is experiencing a GDPR-focused execution to assure only users who require full rights to a corporation's account have access to sensitive information and data. It has a design of their personal account.

So, the Consultant allows particular Account privileges to the sustainable and Sales Procedure teams through which they create Renewals and Sales Operation Account team membership roles and has sales team members allocated to the suitable customers.

5 0
3 years ago
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
Cyber vulnerabilities to dod systems may include
Ivan

Cyber vulnerabilities to dod systems may include all of the above Options.

<h3>What is Cyber vulnerabilities?</h3>

In cybersecurity, a vulnerability is known to be any kind of weakness  exist with the aim to be exploited by cybercriminals to be able to have unauthorized access to a computer system.

Note that in the case above, Cyber vulnerabilities to dod systems may include All of the above Options.

Learn more about cyber vulnerabilities from

brainly.com/question/7065536

#SPJ11

6 0
2 years ago
Other questions:
  • Question 1:
    15·1 answer
  • Is there anyone willing to sign into my google classroom account and help with my work :( i had surgery on monday and have about
    14·2 answers
  • Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
    10·1 answer
  • If you have two pennies, the probability of both coming up heads when flipped
    13·2 answers
  • Suction cup-type headlamp aiming equipment may be used on:
    11·1 answer
  • A file with a com extension is most likely to be a(n) ___ file.
    13·2 answers
  • Which of the following will increase the level of security for personal and confidential information on a mobile device if the d
    14·1 answer
  • What symbol shows autocorrect is in use in access? WILL MARK BRAINLIEST FOR WHOEVER ANSWERS FIRST!!!
    5·1 answer
  • Select the functions in the Insert tab in PowerPoint.
    8·1 answer
  • What are the steps for rearranging the layout of a form?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!