1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
7

Use the drop-down tool to select the word or phrase that completes each sentence.

Computers and Technology
1 answer:
bekas [8.4K]3 years ago
4 0
A is anything that puts computer information at risk
You might be interested in
Which element of the word program window contains buttons for saving a document and for undoing, redoing, and repeating a change
miskamm [114]
The answer is the Quick Access Toolbar. However, it is not only for saving files or undoing your work. Containing a set of commands that are independent, this toolbar is actually customizable wherein you could change these icons to the ones you really need and frequently use. By tweaking the settings, you can even add commands to the Quick Access Toolbar that are not in the ribbon (like New, Open and Print).
7 0
4 years ago
The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemical
Lena [83]

d would be your answer....................................

3 0
3 years ago
Read 2 more answers
A macro enables you to automate repetitive tasks by
Alla [95]

Answer:

To automate a repetitive task, you can record a macro with the Macro Recorder in Microsoft Excel. Imagine you have dates in random formats and you want to apply a single format to all of them. A macro can do that for you. You can record a macro applying the format you want, and then replay the macro whenever needed.

Explanation:

5 0
3 years ago
It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
Y_Kistochka [10]

Answer:

The laws and regulations will often define sensitive or protected data and the reporting requirements in the case of a data breach. Failure to follow the prescribed process can often result in fines or other penalties.

Explanation:

These data security laws should be standardized worldwide in order to stop internet abuses.

5 0
4 years ago
a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
charle [14.2K]

Answer: a)Physical access

Explanation: Physical access is the function that permits the accessing of the  computer system in a physical way. This access work on the building, It organization and other physical buildings.This access make the system prone to high amount of corruption and hacking .

Other options are incorrect because technical access is for the accessing the technical parts,operational access is for controlling the functions and remote access is for accessing the system from remote area.Thus the correct option is option (a).

6 0
3 years ago
Other questions:
  • What is the name of google's mobile operating system, used on smartphones and tablets from many manufacturers?
    6·1 answer
  • The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requir
    8·1 answer
  • Which might be included in both your speaking outline and your preparation outline? A. Detailed descriptions of each main point
    8·1 answer
  • The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if
    12·1 answer
  • True or False (1 point each)
    9·1 answer
  • What are the disadvantages of using photo editing software in photography?
    14·1 answer
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
  • Activity #2
    13·1 answer
  • In your opinion., which Zelda character is the hottest? Be honest.
    7·1 answer
  • Yuki is preparing to write a research paper for his english class. which style guide would be best for him to use? american psyc
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!