1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
12

Which technology will a business use to figure out who accessed confidential files on a company's computer system

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
8 0

Answer:

insaj cdsjl ljhwbalfhb

Explanation:

You might be interested in
A service technician removed the inspection/fill plug from the differential of a rear-wheel- drive vehicle and gear lube started
adell [148]

Answer:

The correct answer is - Technician B is correct.

Explanation:

Because when the service technicians remove inspection plug from a differential of the rear wheel drive vehicles and then the gear lubes is started to flows out and after that, it catches the fluids and allows the fluids to continue to the drain.

So, that's why the technician B is correct.

4 0
3 years ago
Which part of a window lets you see a fileâs contents without opening the file?
Artyom0805 [142]
The preview pane. On the right hand side of the file explorer.
3 0
3 years ago
You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software p
sasho [114]

Answer:

Option (D) i.e., Parallel start up is correct option to the following question.

Explanation:

Parallel startup is also an application or software or a way of using the application of the other Operating System in others just like that the following XYZ inc. has trust on older platform but their system give them cautions for update then they use parallel set up by which they also use old software, as well as they, use the Mac's software in Windows. This strategy provides both the option of usage.

8 0
3 years ago
If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the p
Tanya [424]
<span>If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
Answer: That statement is Ture</span>
3 0
3 years ago
Name two components required for wireless networking<br>(answer fastly)​
Luden [163]

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

5 0
3 years ago
Other questions:
  • If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is
    7·1 answer
  • This provides an easy method for workers to use their computers.
    11·2 answers
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • Which of the following is NOT essential for individuals to have to build their own web page?
    9·1 answer
  • Where would the information needed to start a computer be stored
    10·1 answer
  • A bag of cookies holds 40 cookies. The calorie information on the bag claims that there are 10 servings in the bag and that a se
    10·1 answer
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • Who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!
    10·2 answers
  • I need some help-
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!