1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yarga [219]
3 years ago
13

What percent of records are temporary, if you are not in the OSD?​

Computers and Technology
1 answer:
3241004551 [841]3 years ago
6 0

Answer:

Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.

Explanation:

You might be interested in
A Pool charges $4 each visit,or you can buy a membership. Write and solve an inequality to find how many times a person should u
MAXImum [283]
$4 x number of visits (V)> price of membership (M)
V > M/4
8 0
3 years ago
Which of the following is used to store data in the computer's memory that can be
sasho [114]

The  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

<h3>What is variables?</h3>

Variables can be defined as the way or process in which data or information are store in a computer memory.

Data or information that may likely change or be altered are often stores in a computer memory storage called variables and this store data can be retrieve later for use by a program when executing instruction on the computer  system.

Inconclusion the  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

Learn more about variables here:brainly.com/question/23931018

5 0
2 years ago
A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text mess
tensa zangetsu [6.8K]

Answer:

A. Multifactor authentication

Explanation:

Multifactor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials.

A mobile device user has entered her user ID and password to access an online account, she immediately receives a text message with a unique PIN or One Time Password (OTP) that must be entered before she is granted access to the account. This is an example of a multifactor authentication security method.

8 0
3 years ago
Curtis has been testing a new software package for the past two months. However, he decides not to switch and goes back to using
hodyreva [135]
Retro-active interference
8 0
3 years ago
Pls help me pls I’m struggling
steposvetlana [31]
You have it correct
6 0
2 years ago
Other questions:
  • In 1–2 sentences describe how you would insert a row in a spreadsheet.
    6·2 answers
  • Running fewer applications at once is a way to resolve which type of bottleneck?
    9·1 answer
  • ----------HELP WITH 3 QUESTIONS FOR 30 POINTS!!!---------
    6·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    7·1 answer
  • What is NOT a good habit when presenting to an audience?
    5·2 answers
  • Llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
    7·1 answer
  • Blair is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an emp
    12·1 answer
  • What is targets net worth in 2020 (i will see if you put in 2019)
    11·1 answer
  • What are the functions of super computer?<br> ​
    7·2 answers
  • What does the word collaborative mean?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!