1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
2 years ago
10

First answer gets to be marked brainliest !!!!!

Computers and Technology
1 answer:
Ira Lisetskai [31]2 years ago
3 0

Answer:

1.total access admin

2.total visual agent

3.total access analyser

4.total access detective

5. total access emailer

You might be interested in
Ramesh goes to market for buying some fruits and vegetables .He
3241004551 [841]

Answer:

The algorithm is as follows

1. Start

2. Input Apple unit price

3. Input Mango unit price

4. input Tomato unit price

5. Total = Apple Price * 2 + Mango Price * 2 + Tomato Price

6. Display Total

7. End

Explanation:

Start the algorithm

1. Start

The next three lines gets input for the price of each fruit

<em>2. Input Apple unit price</em>

<em>3. Input Mango unit price</em>

<em>4. input Tomato unit price</em>

This calculates the total price

5. Total = Apple Price * 2 + Mango Price * 2 + Tomato Price

This displays the total price

6. Display Total

Stop the algorithm

7. End

5 0
3 years ago
Which of the following cannot be copyrighted?
Tju [1.3M]
Um.. Where the Answer Choices
8 0
3 years ago
I am a polygon that connects with the bases of a polyhedron
Otrada [13]
A polygon that connects with the bases of a polyhedron is a pyramid.
3 0
3 years ago
Read 2 more answers
What is computer software<br>​
podryga [215]

Answer:

Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work.

7 0
3 years ago
Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they a
Mashcka [7]

Answer:

Standard

Explanation:

IT security policy framework is the documented agreement and policies, as well as procedures of how information is to be transmitted, how to mitigate system and network vulnerabilities in a business.

There are various elements of the IT security framework. An example of this element is the standard adopted. It is a document that gives the details of the hardware and software components used and how they are implemented in the network. Example of this standard is the ISO (international standards organisation).

5 0
3 years ago
Other questions:
  • fill down feature on a formula and you need to keep a cell reference the same which one will allow you to keep the same cell ref
    15·1 answer
  • "______" is a wireless local network that uses high frequency radio signals to transmit an Internet signal from a wireless route
    9·1 answer
  • List four classification of computer based on their size ​
    8·1 answer
  • Write a Java program that creates a two-dimensional array of type integer of size x by y (x and y must be entered by the user).
    7·1 answer
  • Convert one billion byte into one storage unit​
    6·1 answer
  • Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a
    10·1 answer
  • Write a boolean expression that is true if s references the string end.
    8·1 answer
  • I do not understand what the are asking in csys 1.3.6
    12·1 answer
  • You have this code in your program.
    10·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!