1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
10

WHO IS EXCITED FOR COLD WAR SEASON 1????

Computers and Technology
2 answers:
xxMikexx [17]3 years ago
7 0

Answer:

me  iggggggg

Explanation:

shusha [124]3 years ago
7 0

Answer:

meeeeee

im sooo excited !!!!

Explanation:

You might be interested in
What is the Multiplier if the change in RGDP is $525,000,000 and initial spending is $100,000?
OLEGan [10]
The right answer is A
4 0
3 years ago
The first computer introduced was the IBM PC. A. True B. False
Lerok [7]
The answer to your question is true
5 0
3 years ago
Read 2 more answers
The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
sergiy2304 [10]

Answer:

Subject matter experts

Explanation:

Because the security organization institutes the procedures and policies to be executed, they occupy the role of Subject matter expert.

A subject matter expert is a person with a thorough and deep knowledge of a particular process, function, technology, machine, material or type of equipment. Such a person is an expert on that subject.

Therefore the information security organization occupies the role of Subject matter expert.

6 0
3 years ago
Snap Me on <br>samxavier.18​
Ahat [919]

Answer:no thank you ima goody

Explanation:

7 0
3 years ago
Read 2 more answers
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Other questions:
  • In scratch the location of a sprite is defined by what?
    10·1 answer
  • To reboot a pc, hold down the ____ keys at the same time.
    15·1 answer
  • The indent buttons on the home tab allow you to increase or decrease paragraph indenting in increments of ____ inches.
    5·1 answer
  • What needs to be increased in order to increase image size and clarity?
    10·1 answer
  • Write a program that reads a string from the user containing a date in the form mm/dd/ yyyy. It should print the date in the for
    10·1 answer
  • Attribute variables have the same meaning as participants variables. is this true or false?​
    14·1 answer
  • Alexa it is olewi.............................................
    15·2 answers
  • Who are the following furries?
    10·2 answers
  • What is the definition of a nested function?
    8·1 answer
  • ¿Cuáles aspectos serían los que más incidirían para que no se pudiera cumplir con el principio de imparcialidad en una auditoría
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!