1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lesechka [4]
3 years ago
12

Network administrators ____ to set up the browsers on the network to use a proxy server.

Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
4 0
May use a configuration file
You might be interested in
write an assembly program that uses the output compare function of a timer to toggle an led every second
victus00 [196]

Answer:

...

Explanation:

8 0
2 years ago
What is the process called that occurs when you start up your computer? A Download B Restore C Boot D Copy
inn [45]
Starting up your computer can also be referred to as "booting up" therefore, the answer is c
8 0
3 years ago
Read 2 more answers
you have a shop in Salem, Illinois, that sells specialty chocolates. Some customers from France have started placing orders. Whi
Vladimir79 [104]

The data regulation which you must adhere to for your sales to France is known as: D. the General Data Protection Regulation.

<h3>What is GDPR?</h3>

GDPR is an acronym for General Data Protection Regulation and it can be defined as a legal framework that was enforced on the 25th of May 2018, so as to sets guidelines for business firms during the collection, processing and use of personal information from individuals that are residing in the European Union (EU) and the European Economic Area such as:

  • Germany
  • France
  • England
  • Spain

This ultimately implies that, the General Data Protection Regulation is a data regulation which you must adhere to for your sales to France.

Read more on GDPR here: brainly.com/question/27416494

#SPJ1

4 0
2 years ago
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
3 years ago
11
siniylev [52]

Answer:

need help too

Explanation:

7 0
2 years ago
Other questions:
  • Which two technologies support the building of single-page applications?
    11·1 answer
  • Explain why this scenario points towards a potential problem with BIOS.
    10·2 answers
  • The programming interface between an application program and the dbms is usually provided by the
    13·1 answer
  • Describe an ergonomic consideration for your body while working for long periods in front of a monitor or computer screen?
    14·1 answer
  • _______ can be used to prevent busy waiting when implementing a semaphore.
    15·1 answer
  • Create an array named itemDescription containing the following item descriptions:
    15·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·1 answer
  • Write a program. in QBAsSIC
    13·1 answer
  • 7.2.4 Area of Triangle HELP PLEASE!! (JAVA SCRIPT) I WILL WAIT FOR THE SOLUTION.
    12·1 answer
  • As part of their extensive kitchen remodel, the Lees told their electrical contractors that they would need plenty of outlets fo
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!