1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
6

Help!!

Computers and Technology
2 answers:
Eduardwww [97]3 years ago
8 0

the undo option is the right answer



Cloud [144]3 years ago
8 0

Answer:undo

Explanation:

You might be interested in
Your company has been using Windows workgroups on a server running Windows Server 2016. Due to the rapid growth of the company,
Vesna [10]

Answer:

It is an excellent decision to change to active directory

Explanation:

Active Directory offers the following advantages, for optimal customer response:

Main objects (users, groups, units, organization).

Security (groups, NTFS - permits, audit)

Integration (-windows services, Microsoft applications)

Administration (centralized and delegated)

Scalability (domain, tree, forest)

All the above helps us to control access to files.

3 0
4 years ago
Which of these sedimentary rocks is made of the largest particles?
Marta_Voda [28]
Your answer is <span>A.conglomerate.

Hope this helps :)</span>
6 0
4 years ago
A space in a document that is typically in templates to hold pictures or text until the final text is inserted is called a _____
yKpoI14uk [10]

Answer:

D. placeholder

Placeholder are like the field you enter your username and passwords and etc. They can be easily understood my the name itself!

Hope this is the correct answer!

Bye!

6 0
4 years ago
Read 2 more answers
What is the main storage device where the computer stores data?
Fudgin [204]
D. RAM
<span>Primary storage typically refers to random access memory (RAM), while secondary storage refers to the computer's internal hard drive. RAM, commonly called "memory," is considered primary storage, since it stores data that is directly accessible by the computer's CPU.</span>
8 0
3 years ago
The identification of the technology management framework contain?
AlexFokin [52]

Answer:

Explanation:

The effective management of technology as a source of competitive advantage is of vital importance for many organizations. It is necessary to understand, communicate and integrate technology strategy with marketing, financial, operations and human resource strategies. This is of particular importance when one considers the increasing cost, pace and complexity of technology developments, combined with shortening product life cycles. A five process model provides a framework within which technology management activities can be understood: identification, selection, acquisition, exploitation and protection. Based on this model, a technology management assessment procedure has been developed, using an ``action research’’ approach. This paper presents an industrial case study describing the first full application of the procedure within a high-volume manufacturing business. The impact of applying the procedure is assessed in terms of benefits to the participating business, together with improvements to the assessment procedure itself, in the context of the action research framework. Keyword: Technology, Strategy, Management, Assessment

8 0
3 years ago
Other questions:
  • Describe network in the terms of computer lab
    5·1 answer
  • How to make a sad face on keyboard using alt?
    5·2 answers
  • 5. The hazardous component in most antifreeze is _____, which is extremely toxic to humans and animals. A) Calcium Carbonate B)
    13·2 answers
  • Sending an e-mail message to customers or potential customers of a legitimate website asking them to click a link that leads to
    10·1 answer
  • Which of the following sentences is written in a passive voice
    5·2 answers
  • How is a composite key implemented in a relational database model?
    11·1 answer
  • How can you apply multimedia for study explain​
    11·1 answer
  • When should you use an ELIF statement?<br> Edhesive
    15·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
  • Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. he puts the phone down and tak
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!