1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
12

Which statement is NOT a source of threats?

Computers and Technology
2 answers:
Sholpan [36]3 years ago
8 0
The answer is B because it is recovering data so it’s not a threat financial mistakes is a problem and the other one to so the answer is B.

Hope this helps :)))))
kobusy [5.1K]3 years ago
5 0

Answer:

B

Explanation:

because data is phone business

You might be interested in
Match each of the following terms to its function:_________
Crazy boy [7]

Answer:

I = B

II = E

III = A

IV = D

V = C

7 0
3 years ago
Anchor hyperlink to position the cursor to the section called sisters? i need a code pls
enot [183]

use an anchor tag(<a>This is an anchor tag</a>) and use the href attribute and set it's destination to the section element who's id or class is "sisters".



Example:

<a href="#Sisters">Click Here!</a>

then you can add this somewhere on the document.

<section id="Sisters">Hello World!</section>

7 0
3 years ago
Which of these is not a sub-claim "Our Clean Power Plan" uses to support its main claim? The CPP protects public health. The CPP
Leno4ka [110]
The CPP cleans the air statement is not a sub-claim of Our Clean Power Plan.

It is the efforts of President Barrack Obama and the U.S. Environmental Protection Agency that has the main goal of lessening to cutting carbon pollution from the present power plants
4 0
3 years ago
Read 2 more answers
You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remo
vampirchik [111]
If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. <span>Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. </span>It allows the user access<span> to a text terminal and all its </span>applications<span> such as command-line for example. </span>

7 0
3 years ago
Intellectual property does not include which of the following
liq [111]
I'd have to say C. the steel as this is very physical as the others aren't as much which makes it stand out 
8 0
3 years ago
Other questions:
  • What is the difference between chrome and chromium browser?
    9·1 answer
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • Which is a real-world example of a procedure?
    11·1 answer
  • How do you create a logo on Adobe illustrator
    8·1 answer
  • g Which statement is true about the difference between combinational logic circuits and sequential logic circuits? A) Combinatio
    15·1 answer
  • Why did latex replace wax?
    7·1 answer
  • In 1970, the federal government created __________ to both assist and require employers and employees to make the prevention of
    14·1 answer
  • True / False
    6·1 answer
  • which two functions are performed at the llc sublayer of the osi data link layer to facilitate ethernet communication? (choose t
    13·1 answer
  • The network of safe houses that assisted runaway enslaved people was known as:.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!