1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
5

Please help

Computers and Technology
1 answer:
olga2289 [7]3 years ago
5 0
B.............................................................
You might be interested in
Explain briefly the use of the computers in the advertising area​
olya-2409 [2.1K]

Answer:

Brainly.con

Explanation:

5 0
2 years ago
I will give Brainliest to the best answer, I need urgent HELP
laila [671]
The answer is B. Range
4 0
2 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Which type of data is most sensitive and should be protected from malware?
Dennis_Churaev [7]
The correct answer is “C. The credit card number that you use to make an online purchase”
5 0
1 year ago
The following are a set of named spreadsheets with the indicated column headings. Use these spreadsheets to answer exercises 1.3
Dovator [93]

Answer:

There are five work sheets in this excel file, they are equipment, company, company, person and computer. Excel worksheets are made up of cells, with the columns labelled alphabetically and the rows numbered.

Explanation:

The columns of a worksheet is called a field while row are called records. They are used to locate a cell in the worksheet. There are so many statistical, mathematical and engineering functions in excel. It is used to display the analysis of data.

7 0
3 years ago
Other questions:
  • I will mark brainalist! ​
    5·1 answer
  • Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too
    5·1 answer
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • Why is it a best practice of a remote access policy definition to require employees and users to fill in a separate VPN remote a
    14·1 answer
  • Which software is primarily used to create
    15·2 answers
  • What is the meaning of photography​
    5·2 answers
  • How do I start conversations with ppl??? If u answer right I will try send u more points... So please help me
    7·1 answer
  • Uploading Your Work
    14·1 answer
  • Which external reference is formatted correctly?
    6·2 answers
  • Explain with examples what is software​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!