1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
2 years ago
14

Helpppppp please I will give branliest or something please help ​

Computers and Technology
1 answer:
Allisa [31]2 years ago
7 0

OK you don't be sad it is always free

You might be interested in
The type of code that uses eight bits for each character is ____.
Ksivusya [100]
It's Binary code simple as that its made of 8 1's and 0's
7 0
3 years ago
50-75 words about what motivates you in academic life and are these motivators different from what motivates you in your persona
drek231 [11]

<u>Answer:</u>

<em>My teachers & My parents are the main reason to get through academics well. </em>

Though the reason might be common to most of the people, <em>the situation might be unique and the way the advice's are comprehended and the process of intake and the actions would be unique to each person.</em>

How a mother gives medicine to a child along with sugar, in a similar way my <em>parents and teachers gave me advice which made me to stand at this top-level.</em>

6 0
3 years ago
When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the
Neporo4naja [7]

Answer:

The correct options are;

The security administrator makes sure to shred and properly dispose of any printed confidential information

The security administrator uses password-protected files and folders on his work computer

Explanation:

A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records

Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.

3 0
3 years ago
Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
vekshin1

Answer:

Vector

Explanation:

vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.

8 0
2 years ago
16 POINTS
Nostrana [21]
It think it's a Nested List.
Im so sorry if this is wrong
6 0
3 years ago
Other questions:
  • Which of the following is NOT one of the most important elements when designing a website?
    8·2 answers
  • "Switches break up _______________ domains and routers break up _____________ domains."
    14·1 answer
  • How do you use VMware Fusion to make a Tip Calculator?
    10·1 answer
  • What best describes "broadband access"?
    13·1 answer
  • If the Snort IDS captures the IP packets off the LAN segment for examination, is this an example of promiscuous mode operation
    11·1 answer
  • Question #3
    15·2 answers
  • What is the meaning of s used in 0 and 1 in computer .​
    8·1 answer
  • Brianna is feeling overwhelmed by the amount of digital
    13·1 answer
  • Steps to copy and paste text/information from website to Ms-word using keyboard​
    12·1 answer
  • You want to set the sticky bit on an existing directory, subdir, without otherwise altering its permissions. to do so, you shoul
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!