1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
7

Besides a backup technician, who else would have encrypted backup passwords?

Computers and Technology
1 answer:
Rzqust [24]3 years ago
7 0

Answer:

CEO

Explanation:

You might be interested in
The darker shadow of an eclipse is called the penumbra.<br><br> True<br><br> False
Kryger [21]
The correct answer for your  question is true, Hope this helps
8 0
3 years ago
PLEASE HELP ASAP i will mark brilliant
Ray Of Light [21]
1. Cyberbullying
2.Confide in an adult you trust, such as a teacher or a parent
3.It is easy to miscommunicate  and escalate the situation in an online environment

Cyberbully hurts people, so NEVER post something that could hurt someone's feelings

Hope this helps!
3 0
3 years ago
Read 2 more answers
Question 4
Tcecarenko [31]

Answer: squared ← number * number

Explanation:

4 0
3 years ago
a computer technician performed a number of actions to correct a problem. some actions did not solve the problem, but eventually
padilas [110]

The technician should document all that was done to try to solve the problem. A detailed record is a good practice to find solutions.

A detailed record documenting all steps by which a problem was solved is a good practice for technicians.

This documented record will help the computer technician to find the cause the next time.

Clear, accurate records support decision-making and solving problems in any job and profession.

Learn more about detailed records here:

brainly.com/question/6284693

4 0
2 years ago
To complete a forensic disk analysis and examination, you need to create a ____.
just olya [345]
<span>To complete a forensic disk analysis and examination, you need to create a </span>report.
8 0
3 years ago
Other questions:
  • 2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
    5·1 answer
  • What is the recommended size for bulleted text?
    5·2 answers
  • The ability to learn a new computer software program is to ____________ as knowledge of state capitals is to _____________.
    11·1 answer
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • The idea generating technique most often used in writing business letter is ?
    9·2 answers
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • Number 20, can anyone help?
    11·1 answer
  • Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
    14·1 answer
  • A business that helps people find jobs for a fee
    12·1 answer
  • Hosts on the Internet have ________ addresses. Group of answer choices both A and B neither A nor B IP data link
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!