1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
13

WHERE THE SMART PEOPLE AT??????

Computers and Technology
1 answer:
REY [17]3 years ago
8 0

Answer:

I would say A. Method

Explanation:

.

You might be interested in
Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m
attashe74 [19]

Answer:

Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.

Explanation:

4 0
3 years ago
Tabs are usually set ________ to the right of the left margin.
gayaneshka [121]
Ur answer is: a-half-inch
6 0
3 years ago
Read 2 more answers
What information on social networking sites could be used to discriminate against a potential employee
NISA [10]

the answer on plato is b

political affiliations

3 0
3 years ago
Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulatio
svet-max [94.6K]

Answer:

a. HIPAA

Explanation:

HIPPA represents the Health Insurance Portability and Accountability Act that of the United States which becomes mandatory for protecting the medical data in any form.

Also in the case of data protection that represent the general regulations, PCI DSS, GDPR etc would be used

So the option a is correct

hence, all the other options are wrong

8 0
3 years ago
Yo don't take this down just join this server you can say what ever
MrMuchimi

Answer:

Stop this and watch some prawns

4 0
4 years ago
Other questions:
  • What does “int” means in php code
    13·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • A computer processes data using only 1s and 0s true or false?
    9·2 answers
  • Who ever likes Pokemon an wants to help me please comment and I will Give the room for My Assignment
    9·1 answer
  • Explain the purpose of QoS on a TCP/IP network. Define the basic purpose of IP prece- dence, Type of Service, Diffserv, and Expl
    11·1 answer
  • The method needed to arrange for an object to be notified when a window's close-window button has been clicked is
    6·1 answer
  • CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output f
    9·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • Explain any two types of board band connection​
    11·1 answer
  • When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!