1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLEGan [10]
3 years ago
8

Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with

a password. Which of the following is the strongest password?
Computers and Technology
1 answer:
sweet-ann [11.9K]3 years ago
3 0
Stop cheating



It’s b
You might be interested in
Why do people still use Intel HD graphics for gaming?
pogonyaev
People usually do that because they can't afford a gpu or because they don't know anything about a gpu.
8 0
3 years ago
Which of the following is not one of the goals of technical recovery team members during the recovery phase of a BCP? Normalize
Zanzabum

Answer:

Repair damage done to original systems

Explanation:

It is imperative that businesses brace up for moments or period of challenges whereby normal operation is impeded due to disruption in standard system condition. The ability of businesses to thrive and continue to deliver in these circumstances is catered for by the business continuity plan. The recovery team ensures that important processes critical to the business are restored in other to ensure that business operation isn't crippled. Once normalcy ahs been restored, the team ensures recoverabke day in the original system are taken care of. The repair of damage done is not a goal of the recovery ohase in the business continuity plan as repairsvare catered for after recovery event has been finalized.

3 0
3 years ago
Ashley is the record keeper for a bookshop. She gathers and maintains an organized collection of information. What is Ashley usi
maks197457 [2]

The answer is Database.

Reason being is because because the definition of database matches the statement.

- Collection of information that is organized so that it can be easily accessed, managed and updated. 

3 0
3 years ago
Read 2 more answers
Which of the following statements is not true of web storage?
slavikrds [6]

Answer:

The data in web storage is passed to the server with every HTTP request.

Explanation:

There are basically two Web storage APIs Session storage and local storage.Both can store data up to 5MB. They are supported by every modern browser.You can store data in local storage indefinitely and for browser session in session storage.There is no data or information in HTTP request header.So we conclude that option 4 is the answer.

3 0
3 years ago
Which of the following statements is NOT true? a. An infeasible solution violates all constraints. b. A feasible solution satisf
lakkis [162]

Answer:

B. A feasible solution satisfies all constraints.

Explanation:

Linear programming can be explained as a simple technique where we depict complex relationships through linear functions then find the optimum points.

Linear programming is employed for obtaining the foremost optimal solution for a drag with given constraints. In applied mathematics,

real life problem are formulate into a mathematical model. It involves an objective function, linear inequalities with subject to constraints.

Constraints: The constraints are the restrictions or limitations on the decision variables. They usually limit the value of the decision variables.

Hence,

An infeasible solution violates all constraints.

A feasible solution point does not have to lie on the boundary of the feasible region.

An optimal solution satisfies all constraints.

3 0
3 years ago
Other questions:
  • Select the correct answer.
    11·1 answer
  • Which of the following may present a problem for Linux users?
    13·2 answers
  • Which type of software should he use to restrict his information from going out to these websites?
    12·2 answers
  • A _____ miniature battery operated transmitter that can be propelled through a non-metallic pipe or purpose of locating
    6·1 answer
  • The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agr
    12·1 answer
  • Help me please .<br>and thank you ..​
    14·1 answer
  • When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c.
    5·2 answers
  • Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
    8·1 answer
  • This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average
    11·1 answer
  • What is the indication when a student conducting an electronic search of the literature is simultaneously using two databases, p
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!