1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
7

drag each type of document to the correct location on the table. Drag each document to its respective category

Computers and Technology
1 answer:
trapecia [35]3 years ago
4 0

Answer:

What? I don't get it.

Explanation:

You might be interested in
You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
mihalych1998 [28]

Answer:

I think it is manage document.

Explanation:

managing helps us to organize things and write things with ease.

3 0
3 years ago
Read 2 more answers
ANSWER QUICKLY!!!
Lunna [17]

In the above scenario, he create a relatively light website in a short span of time by using option A.

<h3>What is a website?</h3>

A website is known to be a composition of web pages and similar or linked content that is known by a common domain name and it is one that is often published on web server.

Note that In the above scenario, he create a relatively light website in a short span of time by using option A as it is the right choice to make.

Learn more about website from

brainly.com/question/13171394

#SPJ1

4 0
2 years ago
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
1 year ago
It is considered good practice to save a presentation before printing it. true false
Ilya [14]
It is true because it is really a good practise to save a presentation before printing it

5 0
3 years ago
A part-time job performed while in high school must have the approval of your school counselor.
Artist 52 [7]

Answer:

False, it only needs approval of your parents/guardian

May I have brainliest please? :)

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which is an example of withholding you might see on your pay stub
    14·2 answers
  • Which of the following is a narrative essay most like?
    10·2 answers
  • What is the function of the capsid? it allows a virus to live independently. it is composed of genetic material. it destroys the
    12·2 answers
  • Why does my hp computer keep freezing when i move it?
    10·1 answer
  • What is a win-win situation?
    5·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    10·1 answer
  • What does the "zoom tool" do in Photoshop?
    15·2 answers
  • The hexadecimal eqquivalent of (80)10 is
    11·1 answer
  • What is the most common knowledge computer programmers need in order
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!