1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
6

Question:

Computers and Technology
1 answer:
Vlad1618 [11]3 years ago
3 0

Answer:

The file type that uses equations instead of pixels are D.EPS or vector files

Explanation:

You might be interested in
What is a mixer? BTW NOT just any mixer....a mixer in music<br> THis is for tech theater class
ASHA 777 [7]

Answer:

it changes the level of music, such as bass level or sweter level

6 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
4 years ago
if you want to have certain icons available regardless of what tab you are using you should add them to the
jarptica [38.1K]
The hotbar is what i think it is called but it is basically the bar of stuff at the bottom of the screen on windows computers.
4 0
3 years ago
Read the poem again and work in pairs or groups to do the following tasks.
kap26 [50]

Answer:

i have no idea what the answer is

Explanation:

8 0
3 years ago
Other questions:
  • If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is
    7·1 answer
  • 10 facts about turbines
    11·2 answers
  • Which of the following are you likely to find between multiple school buildings in a city wide school district?
    9·1 answer
  • There is a flashing yellow light at the intersection you are approaching. What does the flashing yellow light indicate, and what
    8·1 answer
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • Which screen should be open to customize or personalize a desktop background
    11·1 answer
  • The blank method returns an integer between the two provided numbers. It can take the value of either of the provided numbers
    12·1 answer
  • What is lossless compression
    6·2 answers
  • C++
    14·1 answer
  • If you notice that a worksheet displays columns A, B, C, E, and F, what happened to column D?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!