1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
5

Pasahot ako plzsss kailangan ko na ngayon ​

Computers and Technology
1 answer:
goldfiish [28.3K]3 years ago
3 0

Answer:

what language is this

Explanation:

You might be interested in
PowerPoint Online automatically saves your presentation to what Office Online application? OneDocument OneDrive OneNote OneWay
-BARSIC- [3]

Answer:

OneDrive

Explanation:

OneDrive is Microsoft cloud storage service. so it makes sense it would save it their :)

6 0
3 years ago
Read 2 more answers
The most important criteria of a good tracking method is that it is ______. a. Comfortable b. Computer compatible c. Portable d.
AnnyKZ [126]

Answer:

Comfortable

Explanation:

The most important criteria of a good tracing method is that it is comfortable. because, if you are not comfortable you cannot pay head to their work properly.You cannot made decision and you can also not to recognize your improvements during tracking.

8 0
4 years ago
Read 2 more answers
If you have a long title for a table and need it to span several cells you use
dsp73
If you are talking about on Microsoft Excel then you merge the cells.
6 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
WILL GIVE BRAINLIEST!!!!!!!
stellarik [79]
True











Dhahvdbdbrhhehebdbdbbdbd sorry it has to be longer ahhshdjdjhsjdjdbdnbfbfjfj
7 0
3 years ago
Read 2 more answers
Other questions:
  • The conceptual phase of any system or just the software facet of a system best describes the sdlc
    9·1 answer
  • The Fully Meets rating should be assigned when the spelling suggestion matches query intent
    11·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • how does modern information technology has affected society ?? Need help on how it has affected society
    10·1 answer
  • Describe, step by step, how to create an account for a computer on the domain controller.
    11·1 answer
  • Rock climbing fun html
    12·1 answer
  • You want a class to have access to members ofanother class in the same package. Which is themost restrictive access that accompl
    11·1 answer
  • An operating environment for a computer is ____, free of potential contaminants, and with the temperature and humidity range spe
    9·1 answer
  • Which work habits should you follow to increase work efficiency and avoid health issues?
    6·1 answer
  • What's a website layout
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!