1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
9

Will give brainliest to whoever can answer all of these questions correctly.

Computers and Technology
2 answers:
babymother [125]3 years ago
7 0

false

ppt

chips designed to preform a function

Apologize to the customer for the inconvenience and offer to refund his money or replace the item

OneDrive-CollegeWork-FreshmanYear-NameOfClass

true

Social networking

paragraph

true

complete fill

true


 

neonofarm [45]3 years ago
5 0
The last answer is true

You might be interested in
The way that text and images are arranged on a slide is called _________. A. Layout B. Background C. Style D. Charting
Mademuasel [1]
It is called a layout.
8 0
3 years ago
Read 2 more answers
Q) CITY column of a table contains information such as Bangalore , Bangalore-64 , Bangalore-56001 , Mumbai - 400002 etc in order
saw5 [17]
Data splitting:::::::::::)
7 0
3 years ago
When viewing data entered into a spreadsheet, the columns identify _____.?
AlexFokin [52]
The answer is : variables
When viewing data entered into a spreadsheet, the columns identify Variable. The variables later can be used on a formula to help you process any sort of data that is implemented within excels' formula system
3 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
What tasks do most operating systems perform?
devlian [24]

I would say: This is most common.

3, 5, 6

8 0
3 years ago
Read 2 more answers
Other questions:
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    12·2 answers
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • Defeating authentication follows the method–opportunity–motive paradigm.
    5·1 answer
  • Who owns the internet? <br><br> A.) Nobody<br> B.) W3C<br> C.) NSCA<br> D.) The US Military
    7·1 answer
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • Explain the paging concept and main disadvantages of pipelined
    15·1 answer
  • 4. Give four reasons why a laptop computer is more expensive than a desktop computer of the
    10·1 answer
  • Wha are the types of slide show? define​
    10·1 answer
  • You need to install Windows on a new computer. You also need to replace a motherboard in another computer, and both tasks need t
    14·2 answers
  • CALLING ALL COMPUTER SCIENCE LOVERS!!!!!!!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!