1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
10

HELP PLZZZZZZ

Computers and Technology
1 answer:
Brums [2.3K]3 years ago
3 0

Answer:

Do you want me the money for the policy that has been canceled

You might be interested in
Jupiter has a very ?<br> surface.
mrs_skeptik [129]
Has a very gassy surface
4 0
3 years ago
Which of the following combinations of keys is used as a short for saving a document on a computer
Masja [62]

ctrl+s  

is used to save

Hope this helped

-scav

7 0
3 years ago
Choose the correct term to complete the sentence.
Diano4ka-milaya [45]

Answer:

Object-oriented programming

Explanation:

When used in object-oriented programming , a class is a factory for creating object. An object is a collection of data and behavaiors that represent some entity(real or abstract).

6 0
3 years ago
3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
andriy [413]

Answer:

a,b,c,d,f,g are true only e is false

6 0
3 years ago
A patient asks her doctor to send a copy of her records to another medical office. However, the records are not transmitted beca
bezimeni [28]
 This type of security failure is called WIN32K_SECURITY_FAILURE. <span> This indicates a </span>security failure was detected in win32k. <span>According to a new report issued by Dark Reading, there are a number of key </span>security failures<span> that cybercriminals take advantage of.</span>
5 0
4 years ago
Read 2 more answers
Other questions:
  • You have been hired to set up a network for XYZ Enterprises. What factors will you consider to determine the type of network nee
    7·2 answers
  • You have recently resolved a problem in which a user could not print to a particular shared printer by upgrading her workstation
    12·1 answer
  • If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
    13·1 answer
  • ____________ define the allowable interactions between subjects and objects. credentials responsibilities procedures access cont
    15·2 answers
  • Algoritmos para llevar a cabo una actividad
    15·1 answer
  • What is the grooming process as it relates to online predators
    9·1 answer
  • 2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
    5·1 answer
  • A(n) ____ is system software. Group of answer choices word processing program presentation graphics program operating system spr
    6·1 answer
  • TensorFlow and Pytorch are examples of which type of machine learning platform?
    11·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!