1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
6

I need more friends plz talk with me

Computers and Technology
2 answers:
Citrus2011 [14]3 years ago
8 0

hi chace how are you my friend

Bad White [126]3 years ago
6 0

Answer:

hello hru??

Explanation:

<h2><em><u>PLEASE</u></em><em><u> MARK</u></em><em><u> ME</u></em><em><u> BRAINLIEST</u></em><em><u> AND</u></em><em><u> FOLLOW</u></em><em><u> ME</u></em><em><u> LOTS</u></em><em><u> OF</u></em><em><u> LOVE</u></em><em><u> FROM</u></em><em><u> MY</u></em><em><u> HEART</u></em><em><u> AND</u></em><em><u> SOUL</u></em><em><u> DARLING</u></em><em><u> TEJASWINI</u></em><em><u> SINHA</u></em><em><u> HERE</u></em><em><u> ❤️</u></em></h2>
You might be interested in
What are good reasons to do yearly disaster recovery testing? check all that apply
AlladinOne [14]

The good reasons to do yearly disaster recovery testing are:

  • To be prepared for all possible snags or problems
  • To identify additional vulnerabilities
  • To allow others with the right access to restore operations.

<h3>Why is the plan important?</h3>

The Yearly recovery scenario testing will help pinpoint potential problems. It's easy to miss things. If you discover a potential problem that could lead to data loss during recovery scenario testing, you will have the chance to fix the problem before any data is actually lost.

Restoration procedures should be documented and accessible, so that anyone with the right access can restore operations when needed. If you aren't available, someone will have to restore operations.

Learn more about disaster on:

brainly.com/question/2916834

#SPJ12

5 0
2 years ago
_____________________________________________________is a pre-designed format to help users with the creation of a document, lik
Naily [24]
C template......................................
8 0
3 years ago
__________ was the first operating system to integrate security as its core functions.
Mrrafil [7]
Multics was the first operating system to integrate security as its core functions.
7 0
3 years ago
Read 2 more answers
Double bar graphs compare multiple what
GalinKa [24]
You would multiply by 2
7 0
3 years ago
2. A shift register can operate:
Naddik [55]
C. Both serially and Perullo
8 0
3 years ago
Other questions:
  • Blender questions
    10·1 answer
  • A ____ is a collection of computers and users that are identified by a common security database. workgroup controller segment do
    7·1 answer
  • The purpose of a lockout tagout checklist is to​
    9·2 answers
  • A media scholar is trying to find out whether internet or television political ads are more persuasive. what kind of effects is
    7·1 answer
  • What is a good way to minimize technical problems with your computer
    10·1 answer
  • Type the correct answer in the box.
    5·1 answer
  • You are configuring two PCs for your network, PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192
    15·1 answer
  • A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
    7·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • -) An attribute is a(n)?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!