1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
9

Describing Report Tools Functions

Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
4 0

Answer:

C. format

Explanation:

You might be interested in
Do you think that feedly will help you create an effective personal online learning environment? Why or why not?
goldenfox [79]

Yes. Feedly will help me create an effective personal online environment. I am able to keep up with all the topics that matter to me most. Feedly is able to help me discover insightful sources from publications and blogs. Feedly is also able to uniquely offer clean, minimalist reading experience optimized for productivity.

5 0
3 years ago
Which of the following is an example of how the respiratory system interacts with the circulatory system to excrete waste?
Varvara68 [4.7K]

Answer:

The veins carry oxygen depleted blood away from body parts,  hence the color blue.

Explanation:

5 0
3 years ago
Why not to use settimeout in angular.
barxatty [35]

Answer:

start with what you know

Explanation:

you can learn alot

4 0
3 years ago
A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
Norma-Jean [14]

Answer:

The answer is "Public Key".

Explanation:

PKI stands for public key infrastructure. It is a collection of functions, protocols, equipment, code, and procedures that require to create, maintain, transmit, store and cancel encrypted certs and handle the authentication of a public key.  

  • It is used to sign documents digitally.
  • It works for propagating with Trojans and other malware.
5 0
3 years ago
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
Other questions:
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Data governance consists of? A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and uni
    11·1 answer
  • one data is in memory the computer interpets and executeinstructions to process the data into informationA. TrueB. False
    8·1 answer
  • True or False: <br> The object reference can be used to polymorphically store any class in Java.
    13·1 answer
  • What is alfred anderson in creole?
    6·1 answer
  • Heres a meme<br><br>free pints as well, because why not.​
    10·2 answers
  • Help plz
    10·1 answer
  • How can you say that a painting is real? ​
    7·2 answers
  • Helllllllllppppppppppp
    9·1 answer
  • What is the first phone ever made?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!