1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
devlian [24]
3 years ago
9

FlimFlam.Shop is the best clothing shop ever.

Computers and Technology
2 answers:
julsineya [31]3 years ago
7 0
Uhh ok thanks for the points
SOVA2 [1]3 years ago
6 0
STAN ALBERT

EEEEEEEEEEEE
You might be interested in
A fast-food restaurant has four kinds of employees:
Marysya12 [62]

Answer:

Following is given the detailed solution of the given question.

I hope it will help you!

Explanation:

7 0
3 years ago
Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor's support technician to pro
ikadub [295]

Answer:

Network diagrams.

Explanation:

In this scenario, Jason is the network manager and is leading a project to deploy a storage area network (SAN). He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN input and output (I/O) optimization, Jason need to provide the network diagram to the vendor support technician.

A network diagram can be defined as a graphical representation of the topology of a network connection.

Basically, it gives an illustration of all the equipments such as routers, switches, hubs etc.

7 0
2 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Type the correct answer in the box.
qwelly [4]

Answer:

I think the answer you're looking for is "personal gain"

Hope this helped :D

Explanation:

8 0
2 years ago
A poem for coduction
Nataly_w [17]
I don't know if you want a poem about conduction but if so here ya go

no matter how the heat
different temperatures meet
hot to cold how it's done
4 0
3 years ago
Read 2 more answers
Other questions:
  • To keep your emails concise and to the point
    13·1 answer
  • Computer-generated color images of the brain that provide information about brain activity and glucose metabolism are produced b
    8·1 answer
  • Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
    7·2 answers
  • Write a program to calculate the total salary of the employees in an office. The program will first prompt the user to enter the
    9·2 answers
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • How many people on here are doing edmentum online
    11·1 answer
  • What help in executing commands quickly
    5·1 answer
  • Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evalua
    8·1 answer
  • What is a cell address in xsl sheet
    14·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!