1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
2 years ago
11

Years ago when working a helpdesk, the most common question asked, almost daily, was about resetting passwords. What type of kno

wledge resource would this be
Computers and Technology
1 answer:
ser-zykov [4K]2 years ago
3 0

Answer:

What is the importance of NIOSH and OSHA in the service desk environment? They conduct research on work environments and provide recommendations relating to areas such as preventing work-related illnesses and injuries and creating safe and comfortable work spaces.

Explanation:

You might be interested in
Click _______ to add a new column to a table.
Sophie [7]
The answer is Insert control B

5 0
4 years ago
Read 2 more answers
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Which directive is used when defining 64-bit IEEE long reals?
Taya2010 [7]

Answer:

The answer is "Option b".

Explanation:

In the project of IEEE-754 to define 64 -bit we require a REAL8 double precision that is equal to 8 bytes and 64 bit, and it is also used for floating-point arithmetic, and other options were not correct that can be described as follows:

  • In option a, REAL4 is used to define 32-bit, that's why it is not correct.
  • In option c, This type of declaration is not valid in IEEE, that's why it is wrong.
  • In option d, The REAL is a keyword that is used to define a value but in this, there is no value to define, that's why it is wrong.

7 0
3 years ago
Please tell fast plzzzzz​
taurus [48]

Answer:

it can be anything from attachments/images or links

Explanation:

8 0
3 years ago
Read 2 more answers
Lenders always accept applications for credit
LenKa [72]
The correct answer to the question that is being stated above is FALSE.

The statement is false because lenders do not always accept applications for credit. Lenders always consider credit history of the applicant. If the applicant has a good credit history background, then he qualifies.
3 0
3 years ago
Other questions:
  • "a router interface has been assigned an ip address of 172.16.192.166 with a mask of 255.255.255.252. to which subnet does the i
    5·1 answer
  • What is the speedup of going from a 1-issue processor to a 2-issue processor? use your code from part a for both 1-issue and 2-i
    11·1 answer
  • The program needs a Frisbee Golfer class.
    15·1 answer
  • Other side for bullying
    7·1 answer
  • Can someone tell me how to use the Human machine language for beginners? or websites I should use.​
    7·1 answer
  • Instructions:Select the correct answer.
    15·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • Most presentations use text: A. To draw attention to content
    8·1 answer
  • B) Develop a truth table for expression AB+ C.
    10·1 answer
  • Computer is a major source of informarion why​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!