1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
5

In which setting would you be least likely to find a full-time A/V technician?

Computers and Technology
2 answers:
pshichka [43]3 years ago
5 0
It's B) Restaurant.....
ELEN [110]3 years ago
3 0
My first answer would be school.
You might be interested in
Anyone help me with number 41.
Katarina [22]
It is te = t I yhink
8 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
Select the correct answer.
Scorpion4ik [409]
Answer: C. Myst because it is an adventure game
5 0
3 years ago
Read 2 more answers
What are the two options for adding a new slide into presentations?
nirvana33 [79]
The first being Ctrl+M and the second being clicking the <span>top half of the New Slide button</span>
5 0
3 years ago
Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tes
Zielflug [23.3K]

Answer:

1. Time management

2. troubleshooting

Explanation:

In Software development job, Tester is responsible for Quality of development and deployment. The responsibilities of Tester are following:

  1. Analyze feasibility and validity of software.
  2. Execute all level of testing
  3. Detect and track inconsistencies and defects in software
  4. Provision of solution in timely manners
  5. Provide support and documentation

<u>Definitions</u>

<u />

<u>Time Management</u>

A process of managing and controlling the time to spend on specific activities. Good time management skills help to provide solution in shorter period of time.

<u>Troubleshooting</u>

A form of problem solving by tracing faults in logical and correct manners is called Troubleshooting.

<em>So, This is the reason why I choose, time management and trouble shooting for Tester Job. Because He/She should be able to fix the problem in short period of time.</em>

8 0
3 years ago
Other questions:
  • Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equ
    14·1 answer
  • Analytical processing uses multi-levelaggregates, instead of record level access.? True? False
    12·1 answer
  • A snapshot is most similar to which type of backup scheme
    8·1 answer
  • write a program that calculates the total grade for N classroom exerices as a perfentage. the user should input the value for N
    11·1 answer
  • What are the basic tasks performed by an operating system?​
    5·1 answer
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
  • How do you start using the Internet?
    6·2 answers
  • When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is mos
    15·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!