1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
2 years ago
11

ASAP! WILL MARK BRAINLIEST + 100 POINTS!! Match each word to its description.

Computers and Technology
2 answers:
denpristay [2]2 years ago
7 0

Answer:

Windows- operating system most commonly used by businesses

Spreadsheet, word processing- types of application software

data- type of file created when word processing document is saved

system calls- instructions for the OS provided by application software

documents- folder where documents you create go by default

Recycle Bin- where documents go when you delete them.

toggling- switching from one setting to another

Help menu- best place to get assistance in a word-processing program

I hope this helps, please let me know if any are incorrect.

Naily [24]2 years ago
4 0

When was the Ming dynasty established?

the 1100s CE

the 1200s CE

the 1300s CE

the 1400s CE

You might be interested in
Which type of website is most likely to be biased when providing information about a product?
vlabodo [156]
If the website is talking about someone or something close to the heart of the website. You wouldn't want the website you work for to talk trash about you.

3 0
3 years ago
Read 2 more answers
File details such as the document title and author name are called ____.
MA_775_DIABLO [31]

Answer:

Document properties

Explanation:

From the list of given options, document properties answers the question.

Every computer file has its details which include (but not limited to) the file name, file type, file permission, date etc.

The above details and many more are makes it easy to identify files.

To get a document property, right click on the file/document, select properties, then select the details tab.

On the details tab, you will see a comprehensive list of the properties attributed to that particular documents

5 0
2 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
A piano manufacturer employs piano technicians who inspect instruments before they are shipped to customers: a.When inspecting a
77julia77 [94]

Answer:

a.When inspecting an instrument, Technicians apply specific Inspection Tests; more than one Test can be applied for an inspection. Each piano is inspected by at least one technician, and a technician can inspect more than one instrument.

Explanation:

An Inspection test  is a formal approach used to test a system or product such as machines, package, software. This can be done by dimension inspection,  visual inspection, welding inspection, function test, factory acceptance test. Three major factors to be considered in the test plan include:

Test Coverage,

Test Methods, and

Test Responsibilities

There are specific inspection tests that should be applied when inspecting an instrument. A technician can apply more than one test type to assess the authenticity of a product. More than one technician is needed to ascertain the working mehanism of a machine to ensure it has no fault. A technician  can inspect more than one instrument depending on his diversity of specialization.

5 0
3 years ago
PLEASE HELP!!!!!!!!!!!
NISA [10]

B. to provide basic operational functionality by coordinating hardware components
5 0
3 years ago
Read 2 more answers
Other questions:
  • What are the three business writing formats
    12·1 answer
  • What is one way to measure technological progress?
    5·1 answer
  • : Each individual data items of record is called a
    7·1 answer
  • Describe how electrons move between atoms to create electricity.
    7·2 answers
  • What is software infrastructure?
    15·1 answer
  • To speed up the display of graphics, a(n) ________ is integrated into some video cards. select one:
    12·1 answer
  • Each wireless network has its own name to identify it, known as service set identity. true false
    9·1 answer
  • Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the
    15·1 answer
  • Today's manufacturing workplace is most likely to include
    8·1 answer
  • Hola, alguien aquí me podría ayudar dándome ideas a cerca de office (Word, PowerPoint o Excel) estoy desesperada no puedo pensar
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!