1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
10

WILL GIVE BRAINLIEST!!!!!!!!!

Computers and Technology
1 answer:
sukhopar [10]3 years ago
7 0

Answer:

True

Explanation:

You might be interested in
I’m trying to get answers from Brainly and it’s not showing up. I’ve been refreshing the browser, but it’s the same. I’ve never
Westkost [7]

Answer:

We are having the same problem

Explanation:

7 0
3 years ago
Read 2 more answers
Arrange the Jumbled letters 1.eilf ngrihsa ________________ 2.cersityu ourreecs ________________ 3. ngrihsa ________________ 4.
Alisiya [41]

Answer:

1. file sharing

2. security recourse

3.sharing

4.communication

5.flexible access

Explanation:

-

5 0
3 years ago
Which unit of the computer works as the input​
PolarNik [594]

Answer:

Center Processing Unit ....

4 0
3 years ago
When testing a game, why might you consider throttling the game’s “frames per second”?
Ivenika [448]

Answer:

because if you throttle it then

you can make sure it's okay

4 0
2 years ago
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
Other questions:
  • A ____________ variable is available throughout a program.
    7·1 answer
  • when you cross or enter traffic from a full stop, how much space should you allow on city streets? on the highway?
    11·1 answer
  • Bullets in a text box will do which of the following?
    9·2 answers
  • This is for being Weird!
    15·2 answers
  • Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
    9·1 answer
  • Does this mechanism increase or decrease speed? Why?
    9·1 answer
  • If Anyone can help me out that'll be great
    11·1 answer
  • The microprogram counter (MPC) contains the address of the next microcode statement for the Mic1 emulator to execute. The MPC va
    12·1 answer
  • Does anyone have discord
    14·2 answers
  • What is the name of the device protected by a digital certificate?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!