1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
10

Select the correct answer.

Computers and Technology
2 answers:
NemiM [27]3 years ago
8 0
The answer is B, for sure
DochEvi [55]3 years ago
6 0

Answer:

ask customers to use strong passwords to protect their accounts

You might be interested in
Hello 10 points if my Chromebook is on 26 percent how much time do I have left theoretically
velikii [3]
About 15 minutes.......
7 0
3 years ago
Read 2 more answers
Which of these statements regarding mobile games is true?
SashulF [63]

Answer:

A. They are typically played in doors.

Explanation:

Most logical answer

8 0
3 years ago
Read 2 more answers
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ______
butalik [34]
<span>Two-tiered client/server architecture. The two-tier is based on Client Server architecture. The two-tier architecture is like client server application. The direct communication takes place between client and server. There is no intermediate between client and server. Because of tight coupling a 2 tiered application will run faster</span>
6 0
3 years ago
given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at
Tamiku [17]

Answer:

new_list = play_list[0:4]

Explanation:

5 0
2 years ago
A desperate employee calls because she has accidentally deleted crucial files from her hard drive and can’t retrieve them from t
konstantin123 [22]

Answer: The file may have been lost due to incompatibility with the operating system, inadequate space on the hard disk drive, or through corruption of the recycle bin.

However, I will have to ask her the following questions:

- name of operating system she is utilizing,

- the time of deletion of files,

- the kind or extension of the deleted file,

- the model number of the computer,

- the size of files created after the deletion of files.

Also, sometimes, deleted files could be irretrievable due to security breeches. The employee may not have the required access to the crucial file but accidentally stumble upon it.

After all of these have been determined, then the error is fixed, and the document/file is restored, and becomes accessible to the employee.

6 0
3 years ago
Other questions:
  • What is a geotag?
    10·1 answer
  • ________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
    12·1 answer
  • Sum.Write a program that prompts the user to read two integers and displays their sum.Your program should prompt the user to rea
    11·1 answer
  • Which computer network component allows data transfers from one computer to another through a telephone line?
    11·2 answers
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • What is the order of adding 10.0 to each element in a one-dimensional array of N real numbers?
    13·1 answer
  • Need help please. this effect my technology
    15·1 answer
  • Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
    9·2 answers
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • 1. Using a microphone to create an audio file to accompany a message is an example of how data is processed and sent to an outpu
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!