1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
7

ARAT ML MGA LODSID:426667817 ​

Computers and Technology
2 answers:
juin [17]3 years ago
7 0
What? If this is an online video ch at thing, then count me out lol sorry I just think that this is dangerous I dk
Keith_Richards [23]3 years ago
3 0
Nooo stop posting these they aren’t safe
You might be interested in
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Kipish [7]

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

5 0
3 years ago
How does Shakespeare immediately introduce Tybalt as a menacing character?
Scilla [17]

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

William Shakespeare immediately introduces Tybalt as a menacing character in the first moments of the play "Romeo and Juliet" because Tybalt is an aggressive man who does not support the idea of peace or get peaceful agreements to solve problems. Tybalt does not like the Montague people.

“The tragedy of Romeo and Juliet” was written by the English writer William Shakespeare approximately in 1590 and is considered to be a play in a poetic form. It refers to the story of two lovers that belonged to opposite families in dispute. Their love is forbidden. Eventually, both lovers die and that is the reason for their families to reconcile.

5 0
3 years ago
George has to present the goals of information management to his team member. What is a goal of information management? The goal
Law Incorporation [45]

Answer:

The purpose of information management is to: design, develop, manage, and use information with insight and innovation. support decision making and create value for individuals, organizations, communities, and societies.

Explanation:

5 0
3 years ago
Importance of word processing application​
alina1380 [7]

Answer:

Some of the functions of word processing software include: Creating, editing, saving and printing documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font type, bolding, underlining or italicizing.

Explanation:

8 0
4 years ago
It's important to understand that even information systems that do not use computers
Delvig [45]

Answer:

yes I am not sure if you have any questions or concerns please visit the plug-in settings to determine how attachments are handled the situation in the measurements of the season my dear friend I am not sure if you can send you a great day to day basis of

6 0
3 years ago
Other questions:
  • This question involves the creation of user names for an online system. A user name is created based on a user’s first and last
    13·1 answer
  • If you are asked to bring in agile way of working into the way a meeting runs, which one among the listed options will you imple
    11·1 answer
  • The part of the inside of a computer
    14·1 answer
  • What does computer means?
    9·2 answers
  • Hiding an object, such as a diary, to prevent others from finding it is an example of:______________.
    10·1 answer
  • Which method would provide you with pictures you could upload from a disc that you insert in your computer?
    8·1 answer
  • In the transactional process model of communication, the meaning of a message resides with the ___________.
    6·1 answer
  • What is Adobe Dreamweaver ? What is it used for ? Name and describe its major components and features in detail​
    15·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • Which of these could you use to change data into information?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!