1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
2 years ago
11

Please help me ASAP!

Computers and Technology
2 answers:
netineya [11]2 years ago
5 0

Answer:

loser

Explanation:

m_a_m_a [10]2 years ago
5 0
The answer is B. The crisis management plan acts as net for any sudden crises and provides aid to the issue.
You might be interested in
Will mark brainliest! What does this code do? What kind of code is this called?
gavmur [86]

Answer:

lol u can barly call this a code

Explanation:

its just a type error code i think

3 0
3 years ago
A strategic information system can be any kind of information system that uses information technology to help an organization __
ruslelena [56]

Answer:

The correct option is d.) All of the choices are correct.

Explanation:

The SIS (Strategic Information System), it is developed for respond the corporate world which is used for giving higher advantages of the competition. It was introduced by Dr. Charles Wiseman in 1982 and it is primarily used in the field of the information systems, the strategic information systems is created in the response to the business initiatives to provide the competitive advantage.

3 0
3 years ago
Which type of information should never be given out on social media?
zhenek [66]

Answer:

Sites like Face.book are full of valuable data for people who use social engineering to steal your identity on social media. You should therefore avoid sharing information that's used to verify your identity,

Explanation:

7 0
3 years ago
Read 2 more answers
The purpose of the trusted platform module is:
Elza [17]
A Trusted Platform Module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. Each TPM chip contains an RSA key pair called the Endorsement Key. The pair is maintained inside the chip and cannot be accessed by software.
6 0
3 years ago
Read 2 more answers
An email address contains the @ character. Write a program that takes asks for an email address input from the user and determin
Dvinal [7]

Answer:

Input: [email protected]

Output: the word is not an email adress

Explanation:

7 0
3 years ago
Other questions:
  • A bug collector collects bugs every day for 5 days. Write a program that keeps a running total of the number of bugs collected d
    12·1 answer
  • Which technology was used in fourth generation of computer​
    13·2 answers
  • Question 16 of 20
    12·2 answers
  • As a consommé simmers, the meat and eggs coagulate, forming a
    6·1 answer
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • Is a pocket watch consider a computer
    15·1 answer
  • Do yall think I should be lonely and quit life!!
    8·2 answers
  • Each student has a record on a file consisting of the following data: Student last name, Student ID (numeric), GPA (a decimal nu
    7·1 answer
  • 11:25
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!