1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
10

What is the purpose for the refresh button?

Computers and Technology
2 answers:
Liula [17]3 years ago
7 0

The purpose of the refresh button is to "refresh" the page to either start the page over or update the page entirely. For example, refreshing can update your email account which may show you new emails. It can also be used to start the page over in case technical difficulties are occurring. Hope this helped :)

Sonja [21]3 years ago
6 0

to refresh the page and restart what you are doing

You might be interested in
Do the police check your mobile device during police checks?
JulsSmile [24]

They cannot legally check it without a warrant.


Depending on the circumstances of the arrest/check, and the method of seizure of the mobile device, you are subject to a certain set of rights, laws, or protections. First off, know that it is your right to decline the warrantless search of your mobile phone. If you are arrested or taken into police custody, you should verbally state that you do not consent to a search of your devices. A law enforcement agency is only permitted to conduct a warrantless search of your device if a compelling case for an emergency can be made.


If the authorities are using evidence obtained through an unlawful search of your mobile device against you in a criminal proceeding, you can move for that data to be suppressed under the Fourth Amendment right to freedom from incidental seizures.

4 0
3 years ago
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
Do you need a internet browser to go to the intrnet?​
Sloan [31]

Answer:

No you do not need a interent browzer to get to the internet.

Explanation:

7 0
3 years ago
Read 2 more answers
Mention 5 advantages of internet​
alexira [117]

Answer:

1) We can get various types of information, knowledge.

2) We can communicate with each other no matter where they are if they have internet connection.

3) It can be used as a source of entertainment.

4) Through internet, we can work from home especially in this quarantine time.

5) Through internet, we can show our talent and skills.

Hope it helps :)

If you liked it, please mark this answer as the brainliest one.

4 0
3 years ago
Scenario: As you walk into an empty class, you see a bag on the floor under the desk what will you do next
Keith_Richards [23]
I'm not sure on what you mean by this however lets say that it may contain a device, when entering DO NOT TOUCH ANYTHING, there are different methods on how a device could be triggered either from light switches or by trip wire which its best to leave the facility over all however lets say you cannot then stop listen for any ticking if not then have a flash light, if the room lights are turned off leave them off use a flash light but be careful where you shine it there could be light sensors on the device that trigger when a light hits it hence why the lights are off. when having a flash light you could be able to see a glare of a wire which could be a trip wire. there are many possibilities in how the device was made from timers, trip wire, sound,light,pressure, switches, electronic waves from phones may effect the device and could activate it as well. But anyways this is all a factor and its best to be careful and if able evacuate if the device is in a weird location at a odd time you know its not suppose to be there, and or items moved that are never moved and if it is never moved then there is dust that could have a odd shape like a hand print. Anyways im not sure if your looking for this type of answer but its good to know!
5 0
3 years ago
Other questions:
  • Write a program that prints the number 1 through 10 using a while loop
    6·1 answer
  • The purpose of the ____________ element is to provide a method for a browser to display different images depending on specific c
    14·1 answer
  • True or false? Main Content (MC) may include links on the page.
    6·1 answer
  • What is virtual memory?
    11·1 answer
  • Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?
    13·2 answers
  • 60 POINTS!! WILL MARK BRAINLEST!!
    11·1 answer
  • Modify class Time2 of fig 8.5, (which is split into four pictures) to include a tick method that increments the time stored in a
    8·1 answer
  • Write a static method that implements a recursive formula for factorials. Place this method in a test program that allows the us
    6·1 answer
  • Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONIT
    13·1 answer
  • In what document does the program manager (pm) address the demilitarization and disposal requirements?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!