1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
13

Which ie tab is used to configure how to manage cookies?

Computers and Technology
1 answer:
Virty [35]3 years ago
4 0
Hmm I think it's the favorite bar
You might be interested in
What is non verbal communication ?​
icang [17]

Answer:

Nonverbal communication is the transfer of information through body language, facial expressions, gestures, created space and more.

Explanation:

For example, smiling when you meet someone conveys friendliness, acceptance and openness. Everyone uses nonverbal communication all the time whether they know it or not.

8 0
2 years ago
Read 2 more answers
What is and effective way to display calculation in a word document?
Tju [1.3M]
You only put a numerical expression in  numbers if it is over 100, it the calculation correctly.
<span />
8 0
4 years ago
If I wanna records a game and my voice need to be in the video what app I download.
saveliy_v [14]
<span>Video Editor & Movie Maker App</span>
8 0
4 years ago
Read 2 more answers
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Words or names defined by the programmer are called
polet [3.4K]
<span>Words or names defined by the programmers are called as programmer defined symbols or identifiers. These are called as variables which are just simple storage locations and making available for the program to use. No two variables are same in the code of the program.</span>
6 0
3 years ago
Other questions:
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • Tiff is the default file format for most digital cameras. <br> a. True <br> b. False
    12·1 answer
  • What is the hexadecimal and decimal equivalent of the binary number 110010001110
    5·1 answer
  • What is ethernet? But can somebody to explain me more accurately than wiki and books.
    9·1 answer
  • What is the full form of PDP​
    7·1 answer
  • You suspect that an attacker has hidden files on your machine. What Linux command would you use to search for files with a file
    14·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • HEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPPPPPPPPPPPPPPPPPPPP
    12·2 answers
  • How did Avery and Garth most likely create their
    13·1 answer
  • In order to communicate between devices inside a computer?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!