1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
11

Which feature allows you to copy attributes of

Computers and Technology
1 answer:
avanturin [10]3 years ago
7 0
I’m not sure if this is a more in depth question but this sounds like the feature “copy and paste”?
You might be interested in
Check My Work _____ are made in response to situations that have occurred frequently enough to enable managers to develop decisi
enot [183]

Answer:

a. Programmed decisions

Explanation:

We basically have two types of decision:

  • Programmed decision
  • Non-Programmed decision

Programmed Decision: used for frequent situations of the organization; both internal and external. This decision results in the formulation of rules, procedures, and policies that can be applied in the future.

Non-Programmed Decision: used for unique and ill-structured situations of the organization; both internal and external. They are one-shot decisions. They have been handled by techniques such as judgment, intuition, and creativity.

8 0
3 years ago
Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
Lorico [155]

Answer:

<u>Organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. </u>

Explanation:

The seven domains in an IT structure can be identified as:

  1. User Domain,
  2. Workstation Domain,
  3. LAN Domain,
  4. WAN LAN Domain,
  5. Remote Access Domain,
  6. WAN Domain,
  7. and System / Application Domain

They can be configured as portals for countermeasure failure and intruders, so it is crucial for organizations to look for ways to protect these domains to prevent unauthorized access to private data.

Therefore the relevance of the systematic approach to threats and vulnerabilities, which will assist in organizing the roles, responsibilities and responsibilities for risk management and mitigation.

7 0
4 years ago
New trends, tools, and languages emerge in the field of web technology every day. Discuss the advantages of these trends, tools,
ikadub [295]

Answer:

Explanation:However, with the emergence of several new web development technologies, tools, frameworks, and languages in the last few years, it has now become quite .

7 0
3 years ago
What is one benefit of using electronic sticky notes ?
balu736 [363]
They can be used to just copy/paste e-mailed information without writing down on a paper and losing valuable time. This is one example.
4 0
3 years ago
Read 2 more answers
Transition words and phrase in a paragraph
balandron [24]

Answer:

Msms

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct answer. Larry finds it easy to run legacy programs and applications in a virtualized environment. How does th
    5·1 answer
  • If there is a slow internet connection or limited access to certain sites it is often better to _________ a video file before st
    9·2 answers
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • Which type of cloud computing offers easily accessible software and applications on the machines?
    7·1 answer
  • Google Glass, glasses that allow you to take pictures and search online by speaking commands, are introduced at a technology tra
    8·1 answer
  • WILL GIVE BRAINLIEST
    15·1 answer
  • Kyra is teaching a photography class. She would like her students to share photos. She would also like the students to be able t
    6·1 answer
  • What kinds of new input devices do you think might be invented in 10, 20, or 50 years? How might those devices change the world?
    9·1 answer
  • The pinky finger on the right hand types _____.
    15·2 answers
  • 16. A/An __________ is operated on the principle that the dying have special needs and wants that hospital personnel are too bus
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!