1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
10

In one sentences describe how to change your home page

Computers and Technology
1 answer:
3241004551 [841]3 years ago
4 0

Click Tools, Internet options. ...The Internet Options window will open. ...Click Apply, OK to close the window.Click the wrench icon in the top-right corner of the browser.Select Options.In the 'On startup' section, select Open the home page.options window will open. Go to the Startup section and select When Firefox starts: Show my home page.. In the Home Page field, type in the website address you want to use as your home page.Click OK.


You might be interested in
which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca
snow_lady [41]

The option that explains a method to avoid violation of personal information through phishing is C. never give out credit information to someone who calls you or emails you.

<h3>What is phishing?</h3>

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source.

Therefore, the option that explains a method to avoid violation of personal information through phishing is to never give out credit information to someone who calls you or emails you.

Learn more about phishing on:

brainly.com/question/23021587

#SPJ1

6 0
2 years ago
What kind of heat we feel from the sun
ivolga24 [154]

Is it solar heat? ultraviolet heat? UV?
6 0
3 years ago
Read 2 more answers
Rosanna is a middle school teacher. She has installed a spreadsheet program in her computer that tracks the grades and attendanc
Lana71 [14]

The computer software that should be installed on Rosanna's computer is application software.

The information regarding the application software is as follows:

  • It is the software where the activity is to be performed.
  • The example like a spreadsheet software, presentation software, database software, etc.

Therefore we can conclude that the computer software that should be installed on Rosanna's computer is application software.

Learn more about the software here: brainly.com/question/1022352

8 0
3 years ago
The shortest compressed format of the ipv6 address 2001:0db8:0000:1470:0000:0000:0000:0200 is
devlian [24]

The answer is : 2001:DB80:1470::200

A double colon ( :: ) can replace any single, contiguous string of one or more 16-bit segments (hextets) which is  consist of all 0s, and it can only be used once per IPv6 address. Therefore,any leading 0s (zeros) in any 16-bit section or hextet can be omitted.

3 0
3 years ago
Que significa el término “Informática”?
Ad libitum [116K]

Answer:

Explanation:

proviene del francés informatique, implementado por el ingeniero Philippe Dreyfus a comienzos de la década del '60. ... De esta forma, la informática se refiere al procesamiento automático de información mediante dispositivos electrónicos y sistemas computacionales.

4 0
3 years ago
Other questions:
  • In project integration management, project ______ and _______ are intertwined and inseparable activities
    14·1 answer
  • Which of these is a method of selecting multiple items in Impress or PowerPoint? A. holding down the Ctrl key while clicking ite
    9·2 answers
  • Tree diagrams are useful for
    12·1 answer
  • A _________ is a component commonly used in an analog pressure gauge. Use letter keys to select choices A microprocessor B press
    8·1 answer
  • Encrypting text allows us to encrypt and decrypt the text using a special key.
    9·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • Which option should you choose to change the background of your current slide?
    10·2 answers
  • It is a data being transported on a network​
    13·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • Multiple Select
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!