1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
6

Custom actions help your users by

Computers and Technology
1 answer:
Vladimir79 [104]3 years ago
3 0

Answer:

D) Making it fast and easy to interact with information in your organization.

Explanation:

PLEASE MARK ME AS BRAINLIEST

You might be interested in
Mobile phones that function as credit cards are called _____.
11111nata11111 [884]
The answer is A- Mobile Wallet
It can be used to pay for your purchases instead of using your actual card. It may be an app or it may be already built into the device. It is actually more convenient to others because you can just hold your device at the terminal when you will pay. Mobile Wallets may be smartphones or tablets.
7 0
3 years ago
What are some hazards of being an astronomer??
mariarad [96]
Are you going into space... if so well... space, that is the big issue

3 0
3 years ago
DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
OLEGan [10]

DES is a commonly used symmetric encryption

A) is a commonly used symmetric encryption

<u>Explanation:</u>

DES stands for Data Encryption Standard. It is a symmetric key algorithm and is used for encrypting electronic data. It was developed in 1975. DES is one of the oldest encryption standards to be used in the industry.

The algorithm takes 16 rounds of permutations in order to encrypt data. But now, with the advent of technology, as new algorithms have been designed and put in use, DES is less preferable.

In the process of key generation, some keys generated sometimes turn out to be weak and hence are prone to attacks. If not for the weak keys generation, DES works perfectly fine and is an effective algorithm to encrypt data.

6 0
3 years ago
Listening to music on giggl, join!<br><br> link will be in comments, copy and paste
Ilya [14]

Answer:

umm, we can't say any links

Explanation:

7 0
2 years ago
Read 2 more answers
What date does GTA 6 come out<br> A. 2020<br> B. 2019<br> C. 2021<br> D. 2022
timofeeve [1]

it is a okkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

7 0
3 years ago
Read 2 more answers
Other questions:
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • Which of the following is an example of a query with an explicit location? Select all that apply. True False [walmart boston], E
    7·2 answers
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
    12·1 answer
  • Which of the following statements are true about quick sort
    12·1 answer
  • The purpose of a database is to help people stop using spreadsheets.
    10·1 answer
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • What is the working principle of computer?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!