1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
14

54 points!!! Cyber security

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
3 0

Answer:

a

Explanation:

You might be interested in
What of the following can a cell contain? A number a word a function of these
EastWind [94]
A function of these
8 0
3 years ago
What does the Group feature allow you to do?
notsponge [240]
A it allows you to join a group as a member or to create your own group
6 0
3 years ago
An excel workbook can exist without any worksheet, true or false​
mihalych1998 [28]

False

Explanation:

Its False because every book has worsheet

6 0
3 years ago
On a Windows network share, if the user can add, edit, and delete files and folders within the LabFiles folder, what type of acc
Colt1911 [192]

Answer:

Modify

Explanation:

When people like your family or friends can access a computer, then the need to have permissions would certainly come in handy. There are six basic types of permission one can choose from and the modify option is one of them. It simply grants the holder the ability to read and write files and subfolders and also allows for the deletion of folders and files.

6 0
3 years ago
What are some ways that a victim can do to make cyberbullying stop? Give two examples. Be specific
balandron [24]
Delete the account and/or contact the police,
7 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is not an algorithm?
    8·1 answer
  • What output is produced by the following program segment? Why? (Recall that name.charAt(i) is the i-th character in the string,
    11·1 answer
  • The term median means
    9·2 answers
  • Computers are classified by price, processing speed, capacity, and
    11·1 answer
  • Is the following an example of social media viral marketing? Indicate your response by selecting Yes or No.
    7·1 answer
  • A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
    8·1 answer
  • 0 -10°
    12·1 answer
  • with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
    11·1 answer
  • 2 When you add text with the Text Tool, __________. the text is added to the current layer a new floating selection layer is cre
    10·1 answer
  • What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j < 5; j++) cout <<
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!