1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
2 years ago
13

Gauthmath https://s.tutorus.xyz/lp/invite?code=GGQGBL​

Computers and Technology
1 answer:
sammy [17]2 years ago
3 0

Answer:

Umm

Explanation:

You might be interested in
What time is it in Ohio?
skad [1K]
Geographically, the state of Ohio falls within the lines of latitude of 75 °W and 90 °W. The timezone corresponding to this portion of the globe is eastern standard time (EST). The prime meridian at 0 °, has the timezone greenwich mean time (GMT) from which all other timezones are referenced. And eastern standard time, local time in Ohio, will be 5 hours behind GMT.
5 0
3 years ago
Read 2 more answers
With landscape photography, which depth of field do you normally want? A) Small B)Small to Medium C)Large D)With landscapes it d
RideAnS [48]
I am not 100% on this but i think you would want a Large depth of field. 
3 0
3 years ago
Read 2 more answers
Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field
Cloud [144]

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

3 0
2 years ago
How do you adjust the shear of a shape?
Aloiza [94]
The answer is D. Appearance panel
7 0
3 years ago
Read 2 more answers
How do I copy and paste equations and pictures like math graphs, to post on this site to help get my questions answered?
Mandarinka [93]
Screenshot the math problem and attach it here
5 0
3 years ago
Read 2 more answers
Other questions:
  • A(n ____ with a drop down menu provides consistency in function and appearance making it easy for users to learn and work with t
    7·1 answer
  • Jesse is trying to find a computer file. he types the name of the file into the computer search bar. the computer is most likely
    5·2 answers
  • What are two example of ways an electronic record may be distributed to others?
    11·1 answer
  • Shawn thought that the screen of the block-based program he was using was
    15·1 answer
  • Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
    12·1 answer
  • How does cryptocurrency exchange software works?
    14·1 answer
  • In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors m
    5·1 answer
  • 24/3*2^2/2*3+(20-10)-40
    9·1 answer
  • Electronic evidence on computer storage media that is not visible to the average user is called​ ________.
    14·1 answer
  • Think about a career you would like to have 10 years from now.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!