1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
12

PLEASE HELPPPP ASAPP

Computers and Technology
1 answer:
miss Akunina [59]3 years ago
6 0

Answer:

1.sort

2.inverse

4.c

5.a

6.b

Explanation:

Hope it helps

You might be interested in
In Word, how can you tell when text is selected?
Anit [1.1K]

Answer:

the text will highlited in gray

Explanation:

5 0
3 years ago
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
marta [7]

i believe the answer is b.

8 0
4 years ago
Which of the following are addressed by programing design? Choose all that apply.
Viktor [21]

Answer:

Its B, D, and E

Explanation:

Hope this helps

6 0
3 years ago
Read 2 more answers
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
iren [92.7K]

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

4 0
4 years ago
K
ollegr [7]
True??????????????????????????
7 0
4 years ago
Read 2 more answers
Other questions:
  • Microsoft ____ is the new web browser.
    13·2 answers
  • The top pane of the wireshark window, referred to as the __________, contains all of the packets that wireshark has captured, in
    5·1 answer
  • Which is an example of appropiate online behavior?
    6·1 answer
  • Which vendor certification would you think is the most relevant in the field of IT security? Why?
    7·1 answer
  • To use the Report Wizard to create a report for a query, select the query in the Navigation Pane, click ____ on the ribbon, and
    13·1 answer
  • 2<br><br> What combination of keys turns the value in a cell into a percentage?
    12·1 answer
  • The data type of 17.3 should be ________________.
    12·2 answers
  • Star and peer-to-peer are types of
    9·2 answers
  • Dad Mystery
    9·2 answers
  • When the function below is called with 1 dependent and $400 as grossPay, what value is returned?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!