1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
2 years ago
11

The study and practice of information storage and retrieval is called

Computers and Technology
1 answer:
puteri [66]2 years ago
4 0
Information Science
You might be interested in
Your mom is trying to save room on her hard drive and wants to uninstall some of her applications. She asks you how to do this.
katen-ka-za [31]
<span>Explore and select Uninstall from the context menu. B. Right-click on the application execution file and select Delete from the context menu. C. Go to Task Manager and find the listed application, then right-click on it and select Uninstall. D. Go to Programs and Features and find the listed application. Then right-click on it and select Uninstall.

Hope this helped!</span>
6 0
3 years ago
Read 2 more answers
Which zone of the ocean is deepest ?
AURORKA [14]
If you mean, where is the ocean deepest, the answer is the Marina Trench. It is south of Japan and has the lowest elevation of -11 000 meters
4 0
3 years ago
Read 2 more answers
which student organization helps students with career development by having them become interms to sponsor conferences?
Alex73 [517]

Answer:

Student Government

Explanation:

7 0
3 years ago
NEED HELP ASAP
belka [17]

Answer:

Movie editing and Sound Editing

Explanation:

Gaming tool will not help edit video and audio that the production crew have shot. Media player will simply just play the video and not allow them to edit it. Animation tool isn't useful unless they plan on doing SFX.

8 0
3 years ago
Read 2 more answers
A new company starts up but does not have a lot of revenue for the first year. Installing anti-virus software for all the compan
Feliz [49]

WAN domain which stands for Wide Area Network and consists of the Internet and semi-private lines. The <span>RISKS are: Service provider can have a major network outage, Server can receive a DOS or DDOS attack</span> and A FTP server can allow anonymously uploaded illegal software.





7 0
3 years ago
Other questions:
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • The network topology in which each device is connected directly to a central network switch
    9·1 answer
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • Which of the following people choose a career path for the right reasons
    12·2 answers
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or
    5·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • In terms of CPU scheduling metrics, __________ is the time at which the job completes minus the time at which the job arrived in
    10·1 answer
  • How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records,
    6·1 answer
  • If there are over 1,000 websites about a certain topic, the information is reliable. A. True B. False
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!