1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
2 years ago
11

Only cool people answer this question. are you cool?

Computers and Technology
2 answers:
bogdanovich [222]2 years ago
6 0

Answer:

always been coolswag

gayaneshka [121]2 years ago
3 0

Answer:

Yes

Explanation:

I like frogs

You might be interested in
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Some jobs have a greater risk of workplace violence. Which of the following are factors that lead to an increased risk of workpl
Aliun [14]
Im not sure about B.  but if you can choose mutiple pick C,D,E  but if you can shoose only one than pick A 
3 0
3 years ago
Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual. Wh
777dan777 [17]
There might be insufficient storage space so your computer usually takes a longer time to load.The bigger your file, the longer it takes to load. So the solution is to clear up your storage space



7 0
3 years ago
Role and responsibility of an IT professional
RUDIKE [14]
Create the computer, network, and communication systems that an organization needs
4 0
2 years ago
In order for you to realize there has been a sensory change, it has to reach the __________ level of processing.
Kryger [21]

Answer: In order for you to realize there has been a sensory change, it has to reach the <u>perceptual</u> level of processing.

6 0
3 years ago
Other questions:
  • Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did no
    14·2 answers
  • What port does rdp use by default and from what range of numbers should you select a private port number?
    15·1 answer
  • Which of the following is not a true statement? You can import a table or a query directly from an Access database into an Excel
    15·1 answer
  • To add or remove space before or after a paragraph, users should select.
    9·2 answers
  • ___________________ are aggregated collections of memory and cpu resources that can be shared among groups of virtual machines o
    11·1 answer
  • Please someone help!!!!
    15·1 answer
  • The type of e-cards that have an antenna built into them are __________ cards.
    10·2 answers
  • Assuming outFile is a file stream object and number is a variable, which statement writes the contents of number to the file ass
    13·1 answer
  • Write a police description a person who know you well​
    12·1 answer
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!