1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
3 years ago
5

The Arizona Department of Transportation has offices throughout the state. State documents are stored on a large server in a cen

tral location, so that employees can access the data they need, regardless of their physical location. The type of network used by the organization is most likely a _____.
Computers and Technology
2 answers:
Alisiya [41]3 years ago
7 0

Answer:

mm

Explanation:

pochemuha3 years ago
4 0

Answer:

WAN

Explanation:

You might be interested in
Help fast plzzzzzzzzzzzz ​
eimsori [14]

Answer:

Which question would you like help with?

4 0
3 years ago
Read 2 more answers
In a process called _____, excel continually reviews the workbook for errors in formulas as you create or manipulate it.
Nataliya [291]
Background formula checking is the process in excel that enables it to review continually the whole file for formula errors. This also functions while you are creating and entering new formulas in cells. When an error is found certain codes shows on the cells.
3 0
3 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
Im timed!!!!!!!!!!!!!!!!!!<br><br> I NEED HELP ASAP<br> THANK YOU SO MUCH
Troyanec [42]

Answer:

card sorting

Explanation:

tell me if im wrong...

6 0
3 years ago
Read 2 more answers
What is the benefit of working with a ready-to-use cloud based AI vendor service?
nasty-shy [4]

Answer:

Explanation:

A cloud model allows organizations to purchase only the storage they need – when they need it – eliminating traditional infrastructure expenses. With this model, an organization can use these cost savings for AI development

7 0
2 years ago
Other questions:
  • Write a program that accepts any number of homework scores ranging in value from 0 through
    10·1 answer
  • The front surface of the CCD is called the _________
    11·1 answer
  • True / False
    5·1 answer
  • While doing online research you enter this keyword search with a truncation character: man* Which of the following would not be
    15·1 answer
  • A palindrome is a word or phrase that reads the same both backward and forward. The word ""racecar"" is an example. Create an al
    15·1 answer
  • ________ programming is a method of writing software that centers on the actions that take place in a program.
    8·1 answer
  • Riya wants to save her project work in an external device so that she can show it to her class teacher. Help her to choose the d
    13·2 answers
  • While the names for Web addresses, or URLs, are not case-sensitive, the names for files you create for the Web are. 
    11·1 answer
  • Which of the following are causes of a run-time error. Choose all that apply.
    13·1 answer
  • this feature offered by mutual funds allows investors to switch from one mutual fund to another within a fund families.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!