1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
2 years ago
9

Why cant i get group texts via message after deleting them on my samsung galaxy

Computers and Technology
1 answer:
DedPeter [7]2 years ago
5 0

Answer:

I DONT KNOW               ??????????????????????????????????/

Explanation:

You might be interested in
Can anyone answer this ​
Ivenika [448]

Answer:

I dont see the question

Explanation:

7 0
2 years ago
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
Sergeeva-Olga [200]

Answer:

a, c, d

Explanation:

6 0
3 years ago
Read 2 more answers
Brianna is a multimedia specialist who works for a large fast food chain. What task
Tju [1.3M]

Answer:

Recording and publishing training videos for new employees

Explanation:

Multimedia specialists design and create IT-based multimedia products such as websites, DVDs, and computer games that combine text with sounds, pictures, graphics, video-clips, virtual reality and digital animation

4 0
3 years ago
Rapunzel s-a născut într-un ţinut îndepărtat într-un regat necunoscut. Mama vitregă a închis-o pe Rapunzel într-un turn foarte î
andrey2020 [161]
Iche hebie zaft no guts dude
5 0
3 years ago
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
Vlad [161]

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

3 0
2 years ago
Other questions:
  • How is a cell named?
    9·1 answer
  • Jim is a forensic specialist. He seized a suspect computer from a crime scene, removed the hard drive and bagged it, documented
    10·1 answer
  • Changes in computer technology have an effect on _____.
    13·1 answer
  • Why you should care about copyright
    13·1 answer
  • The syntax for accessing a class (struct) member using the operator -> is ____.
    15·2 answers
  • Emerson needs to tell his browser how to display a web page. Which tool will he use?
    8·2 answers
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    9·2 answers
  • Difference between statement x=+5 and x+=5​
    7·1 answer
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • Select the correct answer from the drop-down menu.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!