1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
3 years ago
7

Which of the following is NOT a function? print, input, if, capitalize?

Computers and Technology
1 answer:
Arisa [49]3 years ago
4 0

Answer:

there are no options

Explanation:

You might be interested in
How do u friend people
Verdich [7]
You click on the three dots and click the person silhouette with the plus sign on it.
4 0
4 years ago
Read 2 more answers
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
4 years ago
Read 2 more answers
Joshua needs to join in two cells together which of the following would perform the function
irina1246 [14]
=(Happy)&(Birthday) this is how it would be formatted 
7 0
3 years ago
I will mark you Brainliest if you could guess how old i am :3
ra1l [238]

Answer:

you are 17

Explanation:

6 0
3 years ago
Explain two ways of searching information using a search engine.​
lozanna [386]

answer:

navigational search queries · for example, “how to make cake?”

informational search · for example, “y-o-u-t-u-b-e” or “apple"

explanation:

  • navigational — these requests establish that the user wants to visit a specific site or find a certain vendor
  • informational — in these instances, the user is looking for certain information
5 0
3 years ago
Other questions:
  • Hardy doesn't have access to a work template, which is on the network server. What should he do?
    14·1 answer
  • Which statements are true about making formatting changes to cells in Excel? (Select all that apply)
    11·1 answer
  • . SQL is a(n) _____ language.
    8·1 answer
  • All of the following activities may infect your computer with a virus EXCEPT ________.
    6·1 answer
  • Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did the Point
    15·1 answer
  • John would like to move from the city into the suburbs and has been saving up a large down payment for a home. Which is the most
    7·1 answer
  • What can your employer do to protect you from overhead power lines?
    13·1 answer
  • Generally, what is the term for storage locations in a processor?
    12·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. true or false.
    9·2 answers
  • Explain information technology ?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!