Answer: Both A and B (DNS and TCP/IP)
Explanation: Internet supervisor protocols are the protocols that have the supervising standards for the internet functioning. DNS (Domain name system)is the system that supervises the internet by the function of the domain names that is accessed by the user.It acts like phone phone book that coverts the domain to the IP address.
TCP/IP is the(Transfer control protocol/Internet protocol) are the protocols that help in the function of the internet by providing the connection with the network.The internet runs with help of TCP/IP suite.Thus both, DNS and TCP/IP are supervisory protocol for internet.
Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.
Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.
Doing so would not only increase your productivity potential / but also increase your productivity STANDARDS for certain jobs (e.g. data entry; secretarial work), which is a direct skill that is valuable to employers. Furthermore, if you work in a a secretarial job, this would allow you to accomplish tasks such as "touch typing" a lot faster (without sacrificing quality) — allowing you more time to accomplish other tasks, making you more efficient and even promotable in terms of pay raise and in terms of promotable to other positions with higher earnings — and even teach new staff members.
_____________________________
1. Acts of human error
<u>Explanation:</u>
Insecurity their are many threats that make a desktop or workstation or laptop. Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.
End-users have made sure all required service is activated and running in the organization.
The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.
Answer:
The time in which the alarm clock will sound
Explanation: Hope this helped please give me brainliest