1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
11

What is wrong with question four? Find the error and then correct it

Computers and Technology
1 answer:
Sonbull [250]3 years ago
6 0
9? Cause thats all not to smart or anything rlly lol
You might be interested in
The motion of any object can be broken down into it's component (parts of) vectors. true or false
Zepler [3.9K]

Answer:

The correct answer choice is true.

8 0
3 years ago
Read 2 more answers
Is the intersection of a column and a row
Alex17521 [72]

A Cell hope you enjoy your answer

3 0
2 years ago
Select the statements that describe Windows® desktops.
antoniya [11.8K]

Answer:

The Recycle Bin is a common desktop feature.

Shortcuts to frequently used programs can be added.

5 0
3 years ago
Read 2 more answers
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
In terms of salary and wages, an applicant should:
Roman55 [17]
Address the issue to the employer after being hired.
7 0
4 years ago
Other questions:
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • Welcome to Cypres...
    6·1 answer
  • 3. List and explain FIVE (5) types of services performed by<br>operating system?​
    11·2 answers
  • Why did the Wright brothers construct their own wind tunnel?
    11·1 answer
  • What is the decimal equivalent of the largest binary integer that can be obtained with
    9·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • _________ mode is similar to Cipher Feedback, except that the input to the encryption algorithm is the preceding DES output. A.
    11·1 answer
  • Choose all the answers that apply.
    14·1 answer
  • Write the class definition for a class named Employee. The class should include data members for an employee object%u2019s name
    12·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!