1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
4 years ago
14

Which of the following will increase the level of security for personal and confidential information on a mobile device if the d

evice is lost or stolen? (Select TWO.)
a. Screen lock
b. Remote wipe
c. OS update/patch management
d. Anti-malware/antivirus
e. Remote backup application
Computers and Technology
1 answer:
Soloha48 [4]4 years ago
8 0
I believe is a and c.
You might be interested in
What determines the speed st which your computer perfoms tasks?
tamaranim1 [39]

The central processing unit (CPU) is what powers the computer. Any lower-end CPUs will not run a quick-functioning computer very well.

3 0
4 years ago
Please convert 5AE into decimal​ fast
MaRussiya [10]

Answer:

it could be decimal or hexadecimal

7 0
4 years ago
What data type do we use to store numbers that will be used for calculations?
uysha [10]

Answer:

Numeric Data

Explanation:

Put simply, numeric data can contain only numbers (as well as associated operators), thus making it the most simple and easiest way to store data which can be calculated. It's not the best answer, but then it would be really long.

3 0
3 years ago
Read 2 more answers
Disney's first cartoon
lora16 [44]

Answer:

Mickey Mouse

Explanation:

7 0
3 years ago
Read 2 more answers
________ alignment is the default alignment for text in Word.
riadik2000 [5.3K]
The default alignment in Word is left-justified.
7 0
4 years ago
Other questions:
  • What is the best application to keep track of inventory for a store?
    6·1 answer
  • Which level of education do most peoplebecoming a broadcast analyst obtain?
    13·2 answers
  • John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
    5·1 answer
  • What term identifies the physical interface between a computer and its peripherals?
    5·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboa
    6·1 answer
  • 3. Under which of the following categories does the artwork fall? ( 1 point )
    11·2 answers
  • How many Brainliest in total can you give? Is there a limit to how many Brainliest you can give per day or per person?
    7·2 answers
  • Object Material: metal or non-metal? Prediction: Will the light bulb light up? Morm Observation: Does the light bulb light up? n
    5·1 answer
  • The information computers give to users or other computers are called
    14·1 answer
  • When you copy a formula that contains an absolute reference to a new location, the reference ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!