1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
12

Plzzzzz help me with this and be serious dont comment random things

Computers and Technology
1 answer:
RoseWind [281]3 years ago
7 0

Answer:

legal and ethical questions

brick and mortar guidelines

website content

customer information

the facts of life

payment processing

human resources

this is in career explorations 2 please help will mark the brainiest ​

Explanation: yes he is right this is correct

You might be interested in
What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
Rufina [12.5K]

Answer:

Pretty Sure its Binary

Explanation:

HTML is used for websites.

4 0
3 years ago
Read 2 more answers
A ___________ is a variable used to pass information to a method.
Sauron [17]

A <em>parameter </em>is a variable used to pass information to a method.

3 0
2 years ago
Read 2 more answers
When you begin typing text, the _________________________ appears on the status bar with an animated pencil writing on paper tha
melomori [17]
Spelling and grammar check icons
3 0
3 years ago
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
3 years ago
Which word most strongly appeals to pathos?
const2013 [10]

Answer:

I think it would be unfulfilled

6 0
3 years ago
Other questions:
  • Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh
    11·2 answers
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    11·1 answer
  • What is master slide and tell about master slide
    6·1 answer
  • To aid Android app developers, who must account for multiple screen sizes and resolutions, Android has introduced the ____, whic
    15·1 answer
  • Which of these are forms of data? Check all that apply.
    8·2 answers
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python
    11·1 answer
  • Your sister asks you if it is possible to get an office productivity suite for free. What do you tell her?
    13·1 answer
  • Which of the following popular presentation software items do you have to purchase in order to use?
    11·2 answers
  • Which of the following images illustrates safe driving?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!