1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
4 years ago
5

In addition to offering word excel PowerPoint and one note the office home and business edition also offers

Computers and Technology
1 answer:
algol134 years ago
8 0

Answer:

Dropbox?

Explanation:

You might be interested in
I microwaved my phone and this Bluetooth popup won't go away and I can't connect to Bluetooth. Help. I have a Google pixel 3XL I
Kobotan [32]

Answer:  Why'd you'd Microwave your phone?

Explanation: Ok first don't do that, it can make it explode, and since you did that, it messed up something, you'll have to get it fixed or buy a new one

Hope this helps^^

7 0
4 years ago
Jim wants to buy a car, he’ll probably only need it for a couple of years he has a short commute to work so he won’t put many mi
Papessa [141]
Is there more information? or options?
4 0
3 years ago
Today's consoles and games have audio features that rival cinematic audio.<br> True or False?
Angelina_Jolie [31]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, a
Anit [1.1K]

The answer is IPS (Intrusion Prevention Systems)

The Intrusion Prevention Systems and Intrusion Detection Systems (IDS) are two security technologies that secure networks and are very similar in how they work. The IDS detects unauthorized user activities, attacks, and network compromises, and also alerts. The IPS, on the other hand, as mentioned, is very similar to the IDS, except that in addition to detecting and alerting, it can also takes action to prevent breaches.


3 0
3 years ago
​You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database
jeyben [28]

Answer:

B. Assign roles and privileges to users so that only job-relevant data is accessible to the user.

Explanation:

Certain departments will require certain information for certain processes. It is not recommendable for every user to access every information of the company as it may reveal vital information.

Hence, every role and department should be given certain privileges to information according to the tasks and needs of the role.

5 0
3 years ago
Other questions:
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    11·1 answer
  • Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • The most direct way for Jonothan to gain on-the-jib experience and earn money while attending school is to apply for
    14·1 answer
  • if an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the cla
    9·1 answer
  • What is "the last mile of broadband access"? Why is this a problem and what kind of impact does it have on the business world an
    9·1 answer
  • Different network scenarios require the
    9·1 answer
  • When you check your hard drive to see how much space is available, you are checking your
    15·1 answer
  • How do big organizations take back their data to be reviewed after a disaster?
    6·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • the image on the right was prooduced by a computer. it shows a complex molecu;e consisting of many atoms. what would be an advan
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!