1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
3 years ago
13

Question # 12

Computers and Technology
1 answer:
PIT_PIT [208]3 years ago
8 0
It is ordinances hope this helps
You might be interested in
How do I do a PowerPoint
kirill115 [55]
It is like this: . You just put a circle and that is a power point
4 0
3 years ago
Read 2 more answers
Please help me with these two questions! 60 points!
RUDIKE [14]

Answer:

Networks prevent unauthorized access to data and protect equipment. Networked computers are less likely than single computers to suffer equipment failure. Networks allow computers to connect quickly and to share data or equipment.

Explanation:

3 0
3 years ago
Every page on a website must be updated recently to consider the website updated/maintained
guajiro [1.7K]
Unmaintained. hope that helped
6 0
3 years ago
Read 2 more answers
What is HTML ? <br>Give a small description about html
Genrish500 [490]
Hypertext Markup Language, a standardized system for tagging text files to achieve font, colour, graphic, and hyperlink effects on World Wide Web pages.
this information was taken from google
7 0
3 years ago
Read 2 more answers
Type the correct answer in the box. Spell all words correctly. What measures should organizations implement so that confidential
miss Akunina [59]

Answer:

Proper Authentication is required. Not all the people should get all the data. If this is the case then you are definitely going to find that data protection is breached. We need to define each user's role as well as privileges clearly or else we are definitely going to suffer. Always ensure proper authentication.

Explanation:

We need to define each user's roles and privileges. And that can be done through Authentication and Authorization,

8 0
3 years ago
Other questions:
  • A good reference point for determining the position of a line or curb in front of you is your __________ . A. Hood ornament B. L
    10·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves mov
    10·1 answer
  • Consider the following program:
    6·1 answer
  • Please answer the following essay question:
    13·1 answer
  • Swapping two input integers if they are not the same. (use switch-case
    10·1 answer
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
  • What version of java do i have installed.
    6·1 answer
  • What is the difference between compliled and intebrated language?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!