1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
7

Another one please help quick i got to go soon

Computers and Technology
1 answer:
astraxan [27]3 years ago
7 0

Answer:

no

Explanation:

yellow: the last sentence in the text

blue: Queenies flowers reached for the sky

Personification means that you apply human characteristics to things that are not alive, like a flower smiling, a term used when people see a field of healthy flowers

You might be interested in
D. DROP
just olya [345]

Answer:

The correct answer is B. BLOB.

6 0
3 years ago
Solid state storage stores data in erasable, rewritable circuitry, rather than on spinning disks, tape, or optical media.
Gwar [14]
It’s true because it’s also called “flash memory”
7 0
4 years ago
What is true about computer files of financial records?
Andrews [41]
Seems like you have forgotten to attach options to choose. But there are some comon statements for such type of tasks and I can recommend you to use this one : finance records should never be kept in computer files. This one is definitely <span> true about computer files of financial records.</span>Next time be more careful.
7 0
3 years ago
Read 2 more answers
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
How to add a bill using the reciept capture?
HACTEHA [7]

Answer: add up all the numbers and then add the tax and then 30% of the total for the tax

Explanation:

like 3+6+8+10=26

26 30%=whatever that is and then add it all up againg and thta is your answer.

5 0
3 years ago
Other questions:
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • Which of the following type of software is the most powerful for managing complex sets of data?
    6·2 answers
  • Which of these components is a part of the central processing unit (cpu) of a computer??
    14·1 answer
  • A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s
    14·1 answer
  • A ________ refers to specific content of a field.
    7·1 answer
  • When was the very first computer made??
    5·1 answer
  • 1. I am a rectangle in a flowchart. What do I represent?
    5·1 answer
  • Explain the four misconceptions about entrepreneurship.
    7·1 answer
  • Characteristics of the printer​
    6·1 answer
  • What are some similarity's between NES console and consoles today
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!