1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
4 years ago
13

If you need help with a topic that isn't present in English or math labs, what should you do?

Computers and Technology
2 answers:
Reika [66]4 years ago
8 0
<span>If you need help with a topic that isn't present in English or math labs you should: 
C. Consult the SQ3 R Method
SQ3 R stands for </span><span>Survey! Question! Read! Recite! Review!.
</span>It is a framework that helps students to understand their assignments.

The first step is: Survey! The chapter: the title, headings, and subheadings captions under pictures, charts, graphs or maps.

<span>Second step is: Question while you are survey</span><span>ing.</span>

<span>Then read and review.</span>

trapecia [35]4 years ago
8 0
I'd go with D, but here's the answer document if you need it:
https://www.coursehero.com/file/p430s5v/A-Recite-the-key-facts-aloud-and-highlight-important-words-B...
You might be interested in
Select the correct answer
DIA [1.3K]

Answer:

b

Explanation:

scan the images with 72DPI

5 0
3 years ago
Which securities protects networks from intruders? *
timama [110]

Answer:

I think it is network security

Explanation:

Heard in an ad before :T

5 0
3 years ago
I need help figuring out 2 pictures with topics that I can put on a magazine about the serengeti. This is something I'm doing fo
Usimov [2.4K]

Answer:

how about lions, trees, or zebras

Explanation:

i looked it up

4 0
3 years ago
Read 2 more answers
When artists have a successful career, there is sometimes the need to collect all their works in an anthology album. Given main(
elixir [45]

Answer:

Answered below

Explanation:

public class BoxSet extends Album{

private boolean isCompleteWork;

private int numDiscs;

public void setIsCompleteWorks( boolean cw){isCompleteWorks = cw;

}

public boolean getCompleteWorks(){

return isCompleteWorks;

}

public void setNumDiscs(int discs){

numDiscs = discs;

}

public int getNumDiscs(){

return numDiscs;

}

public void printInfo(){

super.printInfo();

System.out.print(isCompleteWorks);

System.out.print(numDiscs);

}

}

3 0
3 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
4 years ago
Other questions:
  • The LTE (cellular telephone) standard supports only packet switching"". What cellular services are morst affected by this change
    15·1 answer
  • The _______ is a small program run by a computer when first powered on. its primary function is to stabilize the machine and dev
    11·1 answer
  • When communicating with a server on another subnet, which of the following settings is used to determine which direction it need
    6·1 answer
  • You can run a macro by:
    10·1 answer
  • B. Does “refactoring” mean that you modify the entire design iteratively? If not, what does it mean?
    7·1 answer
  • RrayList Mystery Consider the following method:
    9·1 answer
  • CAN YOU PLEASE ANSWER THE QUESTION DOWN BELOW PLEASE? it not a question it a game
    8·2 answers
  • Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are t
    15·1 answer
  • NEXT
    15·2 answers
  • What are the three computer components that hold a dangerous amounts of electricity? Even when it’s unplugged.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!