1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
5

What are ways to create a study schedule? Check all that apply.

Computers and Technology
2 answers:
chubhunter [2.5K]3 years ago
7 0

Answer:

A.) Create a to-do list

D.) Use index cards

E.) Write things down on a calendar

Explanation:

Katena32 [7]3 years ago
6 0

Answer:

<u><em>A.) Create a to-do list</em></u>

<u><em>D.) Use index cards</em></u>

<u><em>E.) Write things down on a calendar</em></u>

Explanation:

Hope this helps:)

You might be interested in
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
You should adopt naming standards that do not convey information to potential system attackers.
Nonamiya [84]
True








------------------------------
5 0
3 years ago
Who are the key players in the internet
Anna007 [38]
Gamers my dude, dank memes are also the internet's finest minds
4 0
3 years ago
If i had apple and microsoft both on my computer and they both fight what would i do
riadik2000 [5.3K]

Answer:

ok

Explanation:

5 0
3 years ago
Read 2 more answers
Looking at the code below, what happens when this onHit function runs?
inysia [295]
B dxjdbxhxbxbcjxxnxhcbfnc
7 0
3 years ago
Read 2 more answers
Other questions:
  • Dan needs to ensure that delegates as well as those looking at his shared calendar information are unable to see the details of
    7·1 answer
  • Which of the following statements outputs the value of the gpa member of element 1 of the student array?
    5·1 answer
  • Consider an interface p ublic interface NumberFormatter { String format (in n); } Provide four classes that implement this inter
    15·1 answer
  • Please answer quick:))))
    7·1 answer
  • A ________ is a computer or other electronic device connected to a network
    6·1 answer
  • Write a program that reads three numbers and print the largest one step by step answer
    9·1 answer
  • A web page that allows interaction from the user​
    12·1 answer
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
  • Why is the term RAW image file generally used to describe a variety of file formats, which are sometimes known as digital raw ca
    13·1 answer
  • If you want to design computing components for cars and medical
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!