1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
7

13. WHICH OF THE FOLLOWING IS INVOLVED IN CREATING A DOCUMENT? *

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
7 0

Answer:

All of the above

Explanation:

Hope this helps...

You might be interested in
When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
Rama09 [41]

Answer:

access

Explanation:

Managing users' access rights to digital resources within the organization's environment is a fundamental SoD control. As more services are requested by users, utilizing the built-in panels to check compliance with internal controls might become excessive. Companies require a comprehensive Identity Governance and Administration plan to monitor these user access and offer an authoritative source of identity definitions in order to ensure  SoD compliance.

6 0
2 years ago
What is the best programming language
pashok25 [27]

Answer:

Ther are 8 best programming language :

• Javascript

• Swift

• Scala

• Go

• Python

• Elm

• Ruby

• C#

4 0
2 years ago
What do you like to play
Ad libitum [116K]

Answer:I like to play sports

Explanation:

3 0
3 years ago
Read 2 more answers
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
Sati [7]

Answer: Logical Point Blocking

Explanation:

4 0
1 year ago
Changes in the ownership of a file do not change the amount of data that is considered to belong to a user.
professor190 [17]
False because if you edit the ownership of file it will give permissions only with the permissions you can edit file,rename,or delete file.
5 0
3 years ago
Other questions:
  • Consider this scenario: A major government agency experiences a data breach. As a result, more than 100,000 personal records are
    7·2 answers
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • How can i do a back up on one computer and save it to the hard drive in another computer without it being seen by others on the
    9·1 answer
  • When using a wireless mouse, what is the most common port used for the transmitter? 
    7·1 answer
  • Motivation is best defined as
    9·2 answers
  • Users report that the network access is slow. After questioning the employees, the network administrator learned that one employ
    7·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • If there is only a stop sign posted at a railroad
    9·1 answer
  • What is the<br>Way to<br>keep the tool<br>Screw​
    6·1 answer
  • What is professional education? <br><br><br><br><br>Please help me to do this.​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!