1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
13

PLZ HELP! ANSWER (WITH CORRECT ANSWER AND EXPLANATION THAT ACTUALLY IS CORRECT) GETS BRAINLIEST!

Computers and Technology
1 answer:
Trava [24]3 years ago
8 0

Answer:

A

Explanation:

You might be interested in
Why do we install doorbells in our house
Vinil7 [7]

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

6 0
3 years ago
Read 2 more answers
If you're driving a car and know there's a motorcyclist around you, you should______. A. Not change your driving B. Check your b
Sedaia [141]

b check your blind spots frequently i guess not sure

5 0
3 years ago
Why are computer used in almost all the areas?​
vodka [1.7K]

Answer: almost every business uses computers nowadays. They can be employed to store and maintain accounts, personnel records, manage projects, track inventory, create presentations and reports. They enable communication with people both within and outside the business, using various technologies, including e-mail

3 0
2 years ago
How is the cia triad used to evaluate encryption methods?
Lyrx [107]

Answer:

The CIA triad is an important concept in data security, which helps to prevent data from being seen by unauthorized parties, changed, and provide uninterrupted access to data when needed.

Explanation:

CIA triad stands for confidentiality, integrity, and availability. confidentiality is a concept in the triad that prevents unauthorized users from seeing the data, by access control and encrypting the data using various algorithms.

The Integrity of the data prevents the change of the data by unauthorized users. It uses an algorithm for drafting a calculative check to compare the actual data sent and the data received.

Availability tries to break the barrier of data shortage or data unreachable events, by providing multiple access or fault tolerance to data storage.

6 0
4 years ago
1. _____ are used to clarify code, but are not interpreted by the interpreter as commands. (1 point)
mariarad [96]

Answer:

1. D Comments

2. B False

3. C Logical Expression

8 0
4 years ago
Read 2 more answers
Other questions:
  • Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre
    10·1 answer
  • In this recitation assignment, will write a complete C program that accepts as input any two integers from the user and swaps bo
    5·1 answer
  • Task:create a struct that looks like:typedef struct person{ int age; double height;} Person;Create an array of Persons. Read dat
    13·1 answer
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • While the names for Web addresses, or URLs, are not case-sensitive, the names for files you create for the Web are. 
    11·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    6·1 answer
  • Iam trying to find a way to code in Scratch that will let me take away the first two and last two letters of a word. For example
    15·1 answer
  • A patient calls the insurance company's call center
    15·2 answers
  • Darla is going to start writing the HTML code for a web page. What would she start with?
    11·1 answer
  • Hillary’s family is thinking of relocating to a different city to save money. They set up a budget comparing the cost of living
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!