1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
12

Mr. Mathis asked his students to add a comment to a cell the students recorded the steps they followed in a chart. Which student

correctly inserted a comment
Computers and Technology
2 answers:
Goshia [24]3 years ago
8 0

Answer:

The answer is Raj

Explanation:

sergeinik [125]3 years ago
7 0

Where are the students name we can’t answer a question without all the main parts everyone knows that

You might be interested in
You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface elemen
-BARSIC- [3]

Answer:

The answer is "Developing the custom control for the user interface"

Explanation:

The major difference between customized control & user control would be that it inherit throughout the inheritance tree at different levels. Usually, a custom power comes from the system. Windows. UserControl is a system inheritance.

Using accuracy up is the major reason for designing a custom UI control. Developers must know how to use the API alone without reading the code for your component. All public methods and features of a custom control will be included in your API.

6 0
2 years ago
You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protoco
wlad13 [49]

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

3 0
1 year ago
Given a positive real number, print its fractional part.
givi [52]
<span>The modf() function will do this for you:

double x, y, d;
x = -14.876;
y = modf(x, &d);
printf("Fractional part = %lf\n", y);

</span>
8 0
3 years ago
You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with th
bulgar [2K]

Answer:

B. Replace the Bluetooth headset with a new pair.

Explanation:

Since all other mobile devices, after receiving the "corporate-wide" OS update, aren't having issues with pairing with Bluetooth headsets, we can safely conclude that the OS update isn't the issue.

To find out if the Bluetooth headset is not the culprit, we can try to pair the mobile device with a different headset. If it pairs correctly, then we can conclude that the old Bluetooth headset might have a fault, or it might need to be disconnected/forget from the device and paired gain.

7 0
3 years ago
Can you give me a long list of kid's cartoons
notka56 [123]
Gravity Falls
Adventure Time 
SpongeBob SquarePants,
Cailou 
Bubble Guppies
Dora
Teletubbies
4 0
3 years ago
Read 2 more answers
Other questions:
  • All users on the network have antivirus software; however, several users report that they have what an administrator described a
    10·1 answer
  • Write a method called printRange that accepts two integers as arguments and prints the sequence of numbers between the two argum
    6·1 answer
  • ⭐️⭐️⭐️ what Network is larger in size? MAN or WAN? Thank you ⭐️⭐️⭐️
    5·1 answer
  • Which file type is typically used for videos? GIF MPEG MP3 PDF
    8·1 answer
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • Se numeşte permutare a unei mulţimi finite orice rearanjare a tuturor elementelor acelei mulţimi.
    14·1 answer
  • Describe the scope of the variables in this code.
    8·2 answers
  • An online bank wants you to create a program that shows prospective
    12·1 answer
  • When using the red / yellow I green method to present status of a project, green can mean which of the following?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!