1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
9

TIME REMAINING

Computers and Technology
1 answer:
zalisa [80]3 years ago
6 0

Answer: Yes

Explanation:

I believe that files should be deleted once it no more of use because it’s a waste of space. Our devices can only hold so much so if we keep pilling up files on files we will then run out of space. But if we delete what not necessary we can have space to add more useful files.

You might be interested in
Which step of the design process is the company currently engaged
RideAnS [48]

The answer is pictures

8 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Como se juega robótica de cokitos
Anton [14]

Answer:

No sé.

Explanation:

Especifica más.

4 0
3 years ago
What are the set of rules to move data from one computer to another?
ss7ja [257]
I don't believe that there are rules.
Hope I helped,
 Ms. Weasley
4 0
3 years ago
Help me<br> please help me helping me is good help me
laiz [17]

Explanation:

Output will be 4.

STAY SAFE, STAY HAPPY

7 0
3 years ago
Other questions:
  • What folder holds 32-bit programs installed in a 64-bit installation of windows?
    12·1 answer
  • PLEASE HELP ASAP!!!!
    14·1 answer
  • What does pagination mean in Microsoft Word?
    10·2 answers
  • If a device does not require a driver, it is _____.
    6·1 answer
  • Which of the operating systems listed below is not proprietary?
    8·1 answer
  • The inability of BAE Automated Systems to create an automated baggage handling system led to a significant delay in the opening
    10·1 answer
  • How to study program ?
    11·1 answer
  • Image
    9·1 answer
  • The term packet is used fairly generically to refer to protocol data unit (PDU). There are PDU equivalent names in the different
    15·1 answer
  • One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!