1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
6

PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?

Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
3 0

Answer:

a) all cabling hope it helps

You might be interested in
What groups have developed electrode idenfication systems?
Basile [38]

CH24. CH25. CH26. CH27. CH28. CH29. CH30. CH31.

5 0
4 years ago
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
You have a team member on a remote project who is not fluent in English and
Gnom [1K]

Answer:

Through email

6 0
3 years ago
Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
inessss [21]

Answer:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

Explanation:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

8 0
4 years ago
Do anyone else receive random points from Brainly… because I swear I had like 2K+ something and I check and Im at ACE… and with
sergiy2304 [10]

Answer:

i had the same thing happen to me and no it doesnt make sense at all but....i found something out a while ago...

Explanation:

they have achievements and it helps with how you earn points and level up

6 0
3 years ago
Other questions:
  • Rose has a list of two columns of information separated by tabs. She wants to input this information into a table. What is the f
    15·2 answers
  • Write a function cipher(plaintext, n) to shift all characters in a string of text. Your function should take 2 parameters, the p
    15·1 answer
  • What is the significance of the vertical columns of the periodic table? what is the significance of the horizontal rows?
    6·1 answer
  • While multiple objects of the same class can exist, in a given program there can be only one version of each class. Group of ans
    6·1 answer
  • What is the output?
    11·2 answers
  • PLEASE HELP ILL GIVE BRAINIEST
    6·2 answers
  • Which is one of the modes of game advertising?
    13·2 answers
  • ________ is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a convent
    8·1 answer
  • (python) Given the formula for conversion from Celsius to Fahrenheit
    10·1 answer
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!