1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MariettaO [177]
3 years ago
11

```{r}

Computers and Technology
1 answer:
Stells [14]3 years ago
4 0
Know what your trying to say her input pound 45-94
You might be interested in
Which component of the technological system is achieved when an automobiles airbag inflates
Aleonysh [2.5K]
Process is the component achieved.

8 0
3 years ago
Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
lisabon 2012 [21]
The greatest possible perimeter would be 14cm.

3 0
3 years ago
The IT department at Piggy Parts BBQ has recently learned of phishing attempts that rely on social engineering to break into its
Katen [24]

Answer:

all personnel

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question this information should be communicated to all personnel. This should be done as a safety precaution, by making all personnel aware of they would know to speak up if they see anything suspicious otherwise they might think an attack is just part of something that the organization is implementing.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Whats the recommended amount of dedodated wam<br>i can have in a server
Scorpion4ik [409]
Hi! The recommended amount of RAM that you should have is 6gb and above.
5 0
3 years ago
Suggest three ways in which celebrating an occasion influences food choices?
Basile [38]

Celebrating influences food in more than 1 way
6 0
3 years ago
Read 2 more answers
Other questions:
  • A ________ is a small text file passed to a web browser on a user's computer by a web server.
    7·1 answer
  • HELP PLEASE NOW ASAP BRAINLIEST
    13·2 answers
  • why might a portrait be both a portrait of the subject and the photographer? how is a photographer present in a portrait?
    10·2 answers
  • Students at a university are working on a project. the project involves many computing systems working together on disjointed ta
    9·2 answers
  • 7) through: (0, 4) and (-1,0)​
    10·1 answer
  • When are bar charts most commonly used
    10·1 answer
  • Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer dema
    10·1 answer
  • Which keys should you press to insert a comment in OpenOffice Writer?
    15·2 answers
  • Now that you have your file holding your data, you need to analyze the data in three different ways that answer questions you po
    7·1 answer
  • Select the correct answer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!