1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

What is the most appropriate data type for each of these items?

Computers and Technology
1 answer:
Tom [10]2 years ago
7 0
I may be wrong, BUT here is what i think



b) line graph


d) pie graph
You might be interested in
For safety, the lights on your vehicle must be in good working condition. Which statement about
bija089 [108]
I think the answer is a but I am not for sure
7 0
3 years ago
Read 2 more answers
Match the academic requirements with the careers. Technical program , bachelors degree, doctorate degree can go with cosmetologi
Evgesh-ka [11]
Technical program - cosmetologist
Bachelors degree - nutritionist
Doctorate degree - molecular biologist
All careers are dependent on the required education for a particular career and the complexity of education to be competent.
8 0
3 years ago
Read 2 more answers
In the game of economics, producers look to technological improvements to increase which of the following?
Vaselesa [24]
They're looking to increase productivity 
7 0
3 years ago
Read 2 more answers
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
2 years ago
Publishing is copying Web pages and associated files to a Web<br> server. T or f
sineoko [7]
The answer would be true.
4 0
3 years ago
Other questions:
  • MATLAB graphics user interface:<br> Describe what Folder, Command Window and Workspace are.
    5·1 answer
  • True or False. It is required to restart the client computer after the DLP agent has been installed.
    9·2 answers
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • What do you call a set of programs?
    7·1 answer
  • What is information technology
    11·1 answer
  • Which command is not one of the available Change Case options?
    8·1 answer
  • Which of the following are benefits of designing a scalable system? Choose 3 options.
    15·1 answer
  • Me inculparon de crear una cuenta en Facebook y colocaron el barrio donde vivo, ¿cómo podría demostrar lo contrario? Ayuda urgen
    6·1 answer
  • Create a class to represent light bulbs
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!