1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
11

The best way to safeguard your document is to save it

Computers and Technology
1 answer:
givi [52]3 years ago
8 0
The answer is C every few minutes
You might be interested in
Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint: Initialize a
Mrac [35]

Answer:

N = int(input("Enter a number: "))

total = N

for i in range(N-1, 1, -1):

   total *= i

   

print(total)

Explanation:

Ask the user for the input, N

Set the total N at the beginning

Create a for loop that iterates from N-1 to 1 inclusively. Inside the loop, multiply each number in that range and add the result to the total.

When the loop is done, print the total to see the result

6 0
4 years ago
Swapping as applied in memory management with an aid of a diagram​
irga5000 [103]

Answer:

what do i help on?

Explanation:

3 0
3 years ago
In what way, if any, are colleges and universities related?
wariber [46]

Answer: c

Explanation:

7 0
3 years ago
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
The _________ indicates the number of elements, or values, an array can hold
Stolb23 [73]
The size declarator indicates the number of elements, or values, an array can hold.It is used in a definition of an array.<span>The size declarator must be a constant integer expression with a value greater than zero. </span>A subscript is used to access a specific element in an array. 
8 0
4 years ago
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • What is information reach? A. A global public network of computer networks that pass information from one to another using commo
    5·1 answer
  • In server-side discovery pattern, load balancing and routing of the request to the service instances are taken care of by the se
    9·1 answer
  • What’s the difference between the logical and physical structure of a file? What are the advantages of not having an application
    15·1 answer
  • Consider the following code segment:
    8·1 answer
  • What can an attacker use to capture switch traffic that wouldn't normally be sent to the port the sniffer is attached to?
    5·1 answer
  • Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modific
    11·1 answer
  • Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
    7·1 answer
  • What techniques can be used to assess a product?
    12·2 answers
  • ***URGENT***
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!