1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
6

The process of recording and reporting the financial data for a business is known as:

Computers and Technology
2 answers:
lys-0071 [83]3 years ago
8 0

Answer:

marketing marketing marketing

lozanna [386]3 years ago
6 0
I think it’s marketing sorry if I’m wrong
You might be interested in
if a user has one column in a table and would like to make it into two columns which command should be used
BlackZzzverrR [31]
Don't know asdfghjklpoiuytrewqzxcvbnm,
4 0
3 years ago
Need answer ASAP plz
Natalka [10]

Answer:

i can't read a single word on there i'll come back to it if you can zoom in a little

Explanation:

6 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
2 years ago
Are the blank space around the edges of the page
Law Incorporation [45]

Answer:

The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.

8 0
3 years ago
A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP
Sav [38]

Answer:

D. Zero-day

Explanation:

It is clearly stated that the antivirus is still up-to-date on the workstation, and there has been no alterations to the firewall. Hence, this means the software is functional and up-to-date with all known viruses. This shows that this attack is unknown to the manufacturer of the antivirus software and hence no virus definition or patch fixing this problem has been developed yet. In this light, it is a zero-day.

A zero-day is a type of vulnerability in a software that is not yet known to the vendor or manufacturer, hence this security hole makes the software vulnerable to attackers or hacker before it is been fixed.

4 0
3 years ago
Other questions:
  • Pros and cons of Processor Throttling or Scaling?
    13·1 answer
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • What food does swiss eat on christmas?
    10·1 answer
  • To filter a list with the Filter function, on an Excel spreadsheet, you need to perform the following steps: (1) click in any ce
    9·1 answer
  • American company Software Unlimited is planning to expand its operations to the Bangor Republic where the group is the primary u
    7·1 answer
  • What kind of app or technology would you like to create?  Why ? <br><br><br>​
    11·1 answer
  • Please help with the question no. 5 and 7 please help ​
    6·1 answer
  • Who is the intended audience of a pseudocode document?
    14·1 answer
  • 4.2 Lesson Practice​
    8·2 answers
  • Please help!!! Question 8
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!