1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
3 years ago
10

Picture related to cyber safety

Computers and Technology
2 answers:
weeeeeb [17]3 years ago
7 0
Here’s one. You may also want to find ones that look over vpns, footprints, all that

Fantom [35]3 years ago
4 0

Answer:

?????

Explanation:

You might be interested in
WHAT IS A COMPUTER ????
Allushta [10]
A piece of technology
6 0
4 years ago
Read 2 more answers
A type of storage which holds data on a permanent basis for later use<br><br><br><br> Help please
nikdorinn [45]

Answer:

Permanent storage, also called persistent storage, is any computer data storage device that retains its data when the device is unpowered. A common example of permanent storage is the computer's hard drive or SSD.

Explanation:

4 0
3 years ago
Which of the following are characteristics of global variables? Check all that apply.
algol [13]

Answer:

A and D

Explanation:

took the test

7 0
3 years ago
Read 2 more answers
Software that function as an electronic file cabinet
Airida [17]

Answer:

The answer to this question is "Document management software".

Explanation:

Document management software is software that provides a facility to stores data in an organized manner. It manages and tracks its electronic documents.

  • This software controls many fields, that are Storage location, Security and access control, Version control, etc.
  • It is a common component, that is found in an Enterprise Content Management environment, that uses this software.

7 0
3 years ago
Business intelligence is gained through industrial espionage and the gathering of this information often includes illegal or une
Nataly [62]

Answer:

A) True

Explanation:

Industrial espionage utilizes both illegal and unethical methods in gathering information about a corporate organization in order to get business intelligence. This involves stealing intellectual property and trade secrets to use them for a competitive advantage.  because Information about company's products, services, finances, sales, etc can be toold for  economic warfare

3 0
4 years ago
Other questions:
  • What might be the best response to a cyberbuly attack
    6·2 answers
  • Easy question how the internet has impacted y’all life
    13·1 answer
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • A circuit contains three resistors connected in series. the value of r1 is 150 , the value of r2 is 60 , and the value of r3 is
    8·2 answers
  • When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the
    6·2 answers
  • What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
    6·1 answer
  • How do you validate the type of text that a user enters?
    7·1 answer
  • What does NCR stand for
    12·2 answers
  • A (n) ___ system can help a business alleviate the need for multiple information systems.
    13·1 answer
  • after teaching a group of students about measuring systems and drug calculations, the instructor determines that the teaching wa
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!