1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
2 years ago
7

What will happen to the tools and equipment, if it is not store propely?​

Computers and Technology
1 answer:
nikklg [1K]2 years ago
8 0
This question doesn’t make any sense I guess it will rust
You might be interested in
Algorithm that has been coded into something that can be run by a machine.
hram777 [196]
The answer is program
8 0
3 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
3 years ago
Which type of transmission do modems use ?
horsena [70]
Asyncronous is the answer I think
6 0
3 years ago
Read 2 more answers
What is the provincial capital of lumbini province​
olchik [2.2K]

Answer:

hope it helps..

Explanation:

Butwal(recently changed again) , Rupendhai District

5 0
2 years ago
Suppose Pentax develops a new photo editing software and negotiates agreements with a Vietnamese manufacturer to assemble most P
Elis [28]

Answer:

Contract manufacturing

Explanation:

Contract manufacturing involves outsourcing a portion of a manufacturing process of a product to another company.

5 0
2 years ago
Other questions:
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    8·1 answer
  • What is the boundary folding method?
    5·1 answer
  • Whats the size of a short bond paper in microsoft word?
    10·1 answer
  • Which are two main areas of the properties inspector
    7·1 answer
  • HELP ASAP, AND YES I KNOW, WRONG CATEGORY. SORRY!
    7·1 answer
  • Which of the following is not a language commonly used for web programming?
    8·2 answers
  • The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
    11·1 answer
  • How do we explain the difference between fake news and facts​
    8·1 answer
  • View One | View All
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!