1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
14

HELP PLZZZZZZZZ!!!!!!!!!!!

Computers and Technology
1 answer:
adelina 88 [10]3 years ago
7 0

Answer:

Its either business format franchise or business brokers

You might be interested in
What is after Windows 8.1
MAVERICK [17]

Windows 10. The most well-known Windows operating systems are Windows 7, 8, and 10.

7 0
3 years ago
Read 2 more answers
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
Ilya [14]

Answer:

B) Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

3 0
3 years ago
What are important acronyms we use when we talk about the internet? this is for computer science.
vovangra [49]

Answer:

Lol

Brb

Btw

Gtg

Explanation:

I hope this helps

7 0
3 years ago
What is the purpose of the Lookup Wizard?
Reptile [31]

Answer:

The answer is B. To reference data from another table

Explanation:

I just got it right in Edg

4 0
3 years ago
Read 2 more answers
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • __________ software helps the computer carry out its basic operating tasks.
    8·1 answer
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    5·1 answer
  • The inventory tracking system shows that 12 laptop were on hand before a customer brings two laptops to the register for purchas
    9·1 answer
  • How does kinetic energy affect the stopping distance of a small vehicle compared to a large vehicle?
    14·2 answers
  • Which statements accurately describe the Bookmark feature in the Audio/Video control bar? Check all that apply.
    13·1 answer
  • How can i change my age on my profile here bc i am 13 but i accidenlty put 2005 instead of 2006 no need to rush to answer just w
    9·2 answers
  • Write instruction to recharge mobile phone ​
    5·2 answers
  • A local company is expanding its range from one state to fifteen states. They will need an advanced method of online communicati
    9·2 answers
  • Which of the following security policies can be implemented to prevent removable media from automatically launching potentially
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!