1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
6

Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?

Computers and Technology
2 answers:
Gnom [1K]3 years ago
3 0
Bet bet bet i gotcha— my user is “stinkyminky84” sorry about the name i know ya weird lol.
ivolga24 [154]3 years ago
3 0

Why are you talking about games this is brainly but i

dont  have ps4      

You might be interested in
Which of these are forms of data? Check all that apply.
kicyunya [14]
Files, photos, text. Podcast is just on the internet all together so not really saved data while graphs is more of a saved file. So I’d just say files,photos and texts.
6 0
3 years ago
Read 2 more answers
A(n ________ is a program that is used to create, process, and administer a collection of self-describing integrated records.
babymother [125]
V
JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ
3 0
3 years ago
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
What type of element addresses the recovery of critical information technology (it) assets, including systems, applications, dat
TiliK225 [7]

Disaster recovery type of element addresses the recovery of critical information technology (it) assets, including systems, applications, databases, storage and network assets.

<h3>What is disaster recovery plan in information technology?</h3>

A disaster recovery plan (DRP) is a formal document produced by an organization that contains explicit instructions on how to respond to unplanned happenings such as natural disasters, power outages, cyber-attacks and any other disruptive events.

<h3>What is a disaster recovery plan and why is it important to the organization?</h3>

A disaster recovery plan describes procedures for resuming work quickly and reducing interruptions in the aftermath of a disaster. It is an important part of the business continuity plan and it allows for sufficient IT recovery and the precluding of data loss.

To learn more about Disaster recovery, refer

brainly.com/question/24131287

#SPJ4

8 0
1 year ago
Netflix uses ________ analytics to suggest which movies we should watch as well as to develop new content that it is confident w
marusya05 [52]

Answer:

"Predictive analytics" is the correct answer to the given question.

Explanation:

Predictive analysis is the analysis of the data. It is a type of data analytics that gives the future results by analyzing the historical data Some of the examples of predictive analytics are Machine Learning. Netflix is using the technique of Predictive analytics.

Netflix provides the services of entertainment. In Netflix, we watch the movies also it developed the new content.

6 0
3 years ago
Other questions:
  • What is the operating system?
    9·1 answer
  • 7.12 LAB: Contains the character
    12·2 answers
  • A5.3 1012 kg satellite is 1,800 m from another satellite that has a mass of 3.5 x 108 kg. What is the gravitational
    6·1 answer
  • How are logical operators used?
    14·1 answer
  • Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loo
    5·1 answer
  • Which K-Drama was made in 2009?
    5·2 answers
  • What Fortnite skin is more og?
    5·2 answers
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • (lesson 7.9: acceptance-rejection --- continuous examples.) consider the constant . on average, how many iterations (trials) wil
    6·1 answer
  • Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!