1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
3 years ago
13

How can I sent a message?

Computers and Technology
1 answer:
nata0808 [166]3 years ago
7 0
Click on the persons username, under their personal headings should be a subheading that says “send a message” click on it and you’ll be able to talk to whoever it is.
You might be interested in
What did Peter and Rosemary do for a living?<br>​
marta [7]

Answer:

Peter and Rosemary Grant are distinguished for their remarkable long-term studies demonstrating evolution in action in Galápagos finches. They have demonstrated how very rapid changes in body and beak size in response to changes in the food supply are driven by natural selection.

Explanation:

please

6 0
3 years ago
Which transfer of learning occurs when the performance of a maneuver interferes with the learning of another maneuver?
Nutka1998 [239]

Answer:

Negative transfer of learning

Explanation:

Negative transfer of learning occur when the knowledge you've acquired in the past is/are interfering with the one(s) you are currently acquiring.

Example: learning a new language that have some differences in pronunciation from the previous one, changing from a right-sided vehicles to a left-sided vehicles etc.

3 0
3 years ago
Jessica wants to purchase a new hard drive. She wants a drive that has fast access because she will use it to edit videos on her
professor190 [17]

Answer:

7200 RPM magnetic HDD

Explanation:

This gives her all the benefits of the above mentioned.

6 0
3 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
Briefly describe the role of creativity and innovation to entrepreneurship​
prisoha [69]

Answer:

isia

Explanation:

Apooopooopeeepepe

8 0
3 years ago
Other questions:
  • NullPointerException and ArithmeticException are both derived from which class?
    10·1 answer
  • Write on the importance of Computer application to statistics​
    6·1 answer
  • 1. Itemise the order in which BASIC executes arithmetic operation.
    13·1 answer
  • Question 2 of 5
    8·1 answer
  • What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period?
    15·1 answer
  • Which of the following is an example of tangible property?
    5·1 answer
  • 1. asynchronous_communication
    5·1 answer
  • Suppose you are an ad-serving company and you maintain a log of cookie data for ads you serve to the Web pages for a particular
    14·1 answer
  • You are the IT administrator for a small corporate network. The employee in Office 2 is setting up a virtualization environment
    10·1 answer
  • A timer is set after each frame is sent before waiting an ACK for that frame, how long does the timer take to be expired?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!