1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
3 years ago
15

20. The following are considered as ICT skills EXCEPT

Computers and Technology
1 answer:
kykrilka [37]3 years ago
3 0

Answer:

b

Explanation:

You might be interested in
A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
ZanzabumX [31]

Answer:

Option C

Explanation:

The museum authority can easily automate the process of storage of data on cloud once the document is prepared.

This shall help is easy access to data to all and will also prevent issues arising because of non storage of data or some form of mis-happening leading to data loss.

3 0
3 years ago
What I Can Do
Debora [2.8K]

Step 1.

Purchase Requlsition

Step 2.

Requisition Review

Step 3.

Solicibation process

Step 4.

C'valuation and process

Step 5.

Order Management

Step 6.

Involve approvals and disputes

Step 7.

Record Keeping

Explanation:

Hope it help

8 0
2 years ago
Why is it difficult to detect a Trojan horse?
marishachu [46]

Answer:

Explanation:

Because the virus disguises it self as something you are trying to download, then it attackes your device

8 0
3 years ago
Read 2 more answers
What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
GrogVix [38]

Answer:

PAP authentication method

Explanation:

PAP known as Pass word authentication protocol Basically, PAP works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination, so not recommended for applications.

6 0
3 years ago
Please help me ASAP!
VARVARA [1.3K]

Answer:

security hacker

Explanation:

security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.

tell me if this is wrong :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • Once a business determines that change needs to occur, what ahould the
    12·1 answer
  • David has a laptop that is having a problem with the video system. You believe the problem might be the backlight. During your r
    13·1 answer
  • which of the following scenarios is a circumstance in which it would be ethical to practice confidentiality?
    8·1 answer
  • The purpose of a report is to
    13·1 answer
  • Missing slot covers on a computer can cause?
    9·1 answer
  • The derivative of <br><img src="https://tex.z-dn.net/?f=ln%20%5C%3A%20%20%7Cx%7C%20" id="TexFormula1" title="ln \: |x| " alt="l
    7·2 answers
  • What is responsible for what you see on the monitor?
    13·1 answer
  • Why do we need on output device?​
    11·2 answers
  • HURRY GANG 100points!!!! How can you determine which hardware brands and models are the most reliable?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!