1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
9

GIVING BRAINLIST TO WHOEVER ANSWERS

Computers and Technology
1 answer:
valentina_108 [34]3 years ago
8 0
The answer is number 4
You might be interested in
What are QBASIC Operators ?​
Anna35 [415]

Answer: There are four types of operators in QBASIC. They are Arithmetic Operators, Relational Operators, Logical Operators and Sting Operator. a. Arithmetic Operators. Arithmetic Operators are used to perform mathematical calculations like addition, subtraction, division, multiplication and exponential. :)

5 0
4 years ago
Read 2 more answers
As a bank employee, you often work from home and remotely access a file server on the bank’s network to correct errors in financ
strojnjashka [21]

Answer:

TACACS+

Explanation:

Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that provides detailed accounting information and flexible administrative control over the authentication, authorization, and accounting process.

3 0
3 years ago
When operating a forklift, you should always maintain what kind of speed? A. High Speed B. Low Speed C. Medium Speed
timurjin [86]
Low speed unless you want your crates or boxes to fall
5 0
3 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
4 years ago
If a fire should break out in your building, which of the following actions is NOT recommended?
pashok25 [27]

The answer would be C) Scream and run

The last thing you want to do during a fire is panic and freak out. Once you start doing that you will usually make rational decisions. If you remain calm and follow procedure you should be fine, in most cases.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that takes nouns and forms their plurals on the basis of these rules:
    8·1 answer
  • 2. To learn the proper way to set up a table of contents, editors can use a A. style manual. B. dictionary. C. grammar checker.
    15·1 answer
  • _is a computer network created for an individual person
    10·1 answer
  • Write a method that takes in a String and returns a new
    15·1 answer
  • do you think that some people have difficulty talking to others face to face because of how prevalent texting is today
    15·2 answers
  • Write an Assembly program in MIPS that does the following:
    7·1 answer
  • Creating Classes
    12·1 answer
  • Whats the answer :)?<br>i will give brainslist​
    11·1 answer
  • How to give answer like this?????
    14·1 answer
  • you are tasked with managing multiple servers. you want to manage them all from one server manager interface so you don't have t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!