1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
2 years ago
12

Select the correct answer.

Computers and Technology
1 answer:
9966 [12]2 years ago
4 0

Answer:

B

Explanation:

Every HTML document must begin with a declaration of what the document is going to be about.

You might be interested in
Ginny just enrolled in a C-SNP that uses the post-enrollment verification method. When will the plan send her a termination noti
Zolol [24]

The plan will be sent to her for a termination notification letter at the end of her first month of her enrollment.

<h3>What is a notification of termination?</h3>

A notice of termination is known to be that which is often given to an employee or a person and it states that it is the end of their employment or other contract.

Hence, The plan will be sent to her for a termination notification letter at the end of her first month of  her enrollment.

Learn more about verification method from

brainly.com/question/17274244

#SPJ1

6 0
2 years ago
How to cheat on asseeprep
Burka [1]
Just do it just look up the answers mate
6 0
2 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
nadya68 [22]

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

8 0
3 years ago
Read 2 more answers
What is a symbol such as a heavy dot or another character that precedes a text in a power point
Fantom [35]

Answer:

<em>I </em><em>think </em><em>the </em><em>answer </em><em>is </em><em>a </em><em>bullet.</em>

<em>Hope </em><em>this </em><em>helps</em>

4 0
1 year ago
Other questions:
  • Schools are businesses that need to install software on a large number of computers can usually obtain a ______
    13·1 answer
  • THE DOMAIN IN AN EMAIL MESSAGE TELLS YOU THE
    11·1 answer
  • Write a program that prompts the user to enter the year and the first three letters of a month name (with the first letter in up
    8·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    5·1 answer
  • Which option is referred to by the Reports Due tag?
    7·1 answer
  • What is the smartest person ever
    15·2 answers
  • I need help <br> with a question<br> what can i write for ex when he mad
    13·2 answers
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
  • Assume variable age = 22, pet = "dog", and pet_name = "Gerald".
    6·1 answer
  • Write a function sumOfMultiples, that inputs two integers - seed and cap. The function should return the sum of all the multiple
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!