1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
3 years ago
13

PLEASE HELP!

Computers and Technology
2 answers:
Alex73 [517]3 years ago
5 0
The Filter function will allow her to quickly find this data. It is not impossible using the Sort function, but it will take much longer and involve a lot of manual cutting, pasting or deleting of unnecessary data.


D.)Laura can apply a Filter for the top 10 students and a Filter for which schools to exclude from the results.
ryzh [129]3 years ago
3 0
The answer is D. Filters are a very effective way to sort and specify gat students need to be where
You might be interested in
A network technician is setting up a wireless access point in the front office of a small company. The technician needs to disab
VladimirAG [237]

Answer:

He should disable UPnP technology to disallow devices to dynamically add themselves to the network without configuration.

Explanation:

  • UPnP stands for Universal Plug n Play.
  • It is an easiest way that allows gadgets to find all other devices connecting to your network.
  • This can also modify router settings to allow devices from outside the network to access the router.
  • External IP address can also be obtained by the gadget and a new port forwarding map can be set
  • So from all perspectives, UPnP is an open invitation for hackers to scan for the ports and hack into the device.
  • UPnP is a vulnerability to the secure system
6 0
3 years ago
Which is a feature of a search engine? stores web pages belonging to a single website displays web pages within a browser finds
faltersainse [42]
Finds web pages that matches key words
8 0
3 years ago
Jargon is:
pentagon [3]

Answer: The answer would be "B" - language that includes terms that only a select few can understand

Explanation:

3 0
3 years ago
Read 2 more answers
Write measure five safety measures can be taken to stay safe in social media​
alexdok [17]

Answer:

  1. <u>Use a strong password</u>.
  2. <u>Use a different password for each of your social media accounts</u>.
  3. <u>Set up your security answers. </u>
  4. <u>If you have social media apps on your phone, be sure to password protect your device.</u>
  5. <u>Be selective with friend requests. </u>

5 0
2 years ago
Read 2 more answers
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is
ruslelena [56]

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

5 0
3 years ago
Other questions:
  • Bill needs to make a presentation in which he has to represent data in the form of a pyramid. Which feature or menu option of a
    14·1 answer
  • Complete the recursive function raisetopower(). ex: if userbase is 2 and userexponent is 4, then raisedvalue is assigned with 16
    5·1 answer
  • Write a program that reads numbers from a file (or allow user to input data) and creates an ordered binary tree. The program sho
    8·1 answer
  • I need help someone plz i need it fast ..........
    7·2 answers
  • How is knowing how to use word or docs importamt?
    8·1 answer
  • Pls help... : Slide layouts can be changed by _____.
    9·1 answer
  • Zybook C++ 3.21 answer
    9·1 answer
  • One rule in the Java programming language is that you have to place a semicolon at the end of each statement. What is this rule
    10·2 answers
  • Large and fast disks should be used for as doing so will ensure work is done as quickly as possible?
    8·1 answer
  • Which one of these are a valid IPv4 address?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!