1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
2 years ago
12

Can anyone answer this ​

Computers and Technology
1 answer:
Ivenika [448]2 years ago
7 0

Answer:

I dont see the question

Explanation:

You might be interested in
Cursor/Blinking line is used to show current_ on document. A- Color b- Status c- Type d- Location
Natalija [7]

Answer:

d. Location

Pretty sure this is it.

7 0
2 years ago
Which of these allows the programmer to put data inside a variable?
gregori [183]

Answer:

it's the equal sign "="

5 0
2 years ago
Why is weather forecast so important for hang gliders?
professor190 [17]
Well, it wouldn't be such a good idea if they got caught up in a storm, would it? :p

Strong winds could blow them off-course, or even lightning has a chance of striking the hand glider, causing damage to the glider, the person, or even both.

Additionally, a weather forecast can help in my generic situations. For example, knowing whether to wrap up warm for cold weather, or wear something a bit more loose and breathable for hot weather.
6 0
3 years ago
A list of the available non keyboard characters can be seen in windows by opening what utility
Leya [2.2K]
Character Map ... I hope This Helps
8 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
Other questions:
  • Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data
    11·1 answer
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • All of the following except one are issues that should be covered in an AUP. Which one is the exception?
    5·1 answer
  • Given the function definition
    12·1 answer
  • Whats the difference between copying a file to my desktop and creating a shortcut?
    8·1 answer
  • What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
    8·1 answer
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • What means the data is still saved even if you turn the computer off or unplug it?​
    5·1 answer
  • MLB The Show 17, which simulates professional baseball games, and Madden Football, which simulates professional football games,
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!