1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
10

which type of information could reasonably be expected to cause serious damage to national security if disclosed without authori

zation
Computers and Technology
1 answer:
Katarina [22]3 years ago
7 0

Answer:

Confidential Information

Explanation:

You might be interested in
What piece of software tells the operating system how to use a specific hardware device?
professor190 [17]
A driver for that hardware specific task. Like Nvidia makes GPU's so they also make GPU drivers
8 0
4 years ago
Which number is equivalent to 3e-2?<br><br> 30<br><br> 0.03<br><br> 0.3<br><br> 3
nevsk [136]

Answer:

0.03

Explanation:

3e-2 is in scientific notation, also known as standard form. Used to write large or small numbers in another way. In the number 3e-2, the numbers are defined as follows:

3 = coefficient

e = 10 to the power of

-2 = exponent

The scientific notation 3e-2 is same as 3 x 10^-2 or 3 x 10-2. Thus, to get the answer to 3e-2 as a decimal, we multiply 3 by 10 to the power of -2.

= 3e-2

= 3 × 10-2

= 0.03

3 0
2 years ago
The school has determined that finding the absolute best schedule cannot be solved in a reasonable time. Instead they have decid
Anettt [7]

Answer:

i dont know what to say

Explanation:

... speechlessss

4 0
3 years ago
What is a histogram?
Mice21 [21]

Answer:

I’m pretty sure its C. Can you mark me Brainliest if I am correct? Thank you have a nice day!

Explanation:

8 0
4 years ago
______ devices are high-performance storage servers that are individually connected to a network to provide storage for the comp
natali 33 [55]
NAS - network attached storage
3 0
4 years ago
Other questions:
  • A four year old laptop will not boot and presents error messages on the screen
    8·1 answer
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • One of the network printers is producing copies where the toner is smeared on paper after printing. What component should be che
    11·1 answer
  • Before a computer can store a real number in memory, it must be encoded in __________.
    14·1 answer
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • a _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a
    14·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
  • During slide show mode, hitting the B key will do which of these things? end your presentation move back one page move to the fi
    15·1 answer
  • 3. Find the best.
    13·1 answer
  • What is the purpose of secondary<br> memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!