1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
3 years ago
6

Which of these is not an example of a transition

Computers and Technology
1 answer:
Mrrafil [7]3 years ago
4 0

Answer: post the picture

Explanation:

1. Take the picture

2. Post it on brainly

3. Get your answer

You might be interested in
Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
GarryVolchara [31]

Answer:

d. Data Loss Prevention (DLP)

Explanation:

Data Loss Prevention (DLP) -

It refers to the type of strategy , where any sensitive or personal information can not be leaked out in the corporate network , is referred to as data loss prevention .

There are various software products that help to save the data , by controlling the information shared by the users .

The method is important for any business .

Hence , from the given scenario of the question ,

The correct answer is d. Data Loss Prevention (DLP) .

7 0
3 years ago
Which of the following would be least effective?
Goryan [66]

Answer:

Exponential

Explanation:

The growth of an exponential function will develop much faster than all other functions included in the options meaning the execution time will take longer. This makes exponential functions the least efficient.

4 0
3 years ago
WHAT IS MULTIMEDIA SUPPOSED TO MEAN ???
melisa1 [442]

Answer:

using more than one medium of expression or communication

3 0
3 years ago
Read 2 more answers
Why is making a model, or prototype, important in the design process?
seropon [69]

Explanation:

to size up and define your works organize and having a creative thoughts and imaginations in it to properly execute the measurement of the clothes.

8 0
3 years ago
Which of the following protects against cave-ins? A. All answer choices protect against cave-ins B. Shielding C. Shoring D. Slop
babunello [35]
I think it is b idk if it is 100% right
4 0
3 years ago
Read 2 more answers
Other questions:
  • Explain what the 35ppm specification means
    13·1 answer
  • True or False<br><br> The signing of Act 26 made Cyber Harassment of a Child a crime.
    14·1 answer
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
    14·1 answer
  • Recovery after a disaster involves installing the most recent ________ backup copy.
    15·1 answer
  • What is the major difference between the intranet and extranet?
    11·1 answer
  • The advancement of technology in our daily lives has changed how we interact with the world.
    10·1 answer
  • Write a program with a "function" named "getMinFromInput()" that reads a list of integers from the keyboard and returns the smal
    5·1 answer
  • What is the value of x after running this code?
    13·2 answers
  • List at least 5 features that can be used to format a report.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!