1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
10

How can you modify elements of the Start menu?

Computers and Technology
2 answers:
VladimirAG [237]3 years ago
4 0

Answer:

C

Explanation:

Yanka [14]3 years ago
3 0

Answer:

c

Explanation:

c). by changing and updating the operation system

These days, the graphic user interface (the colorful world of icons, windows, and menus) is standard. Mac, Windows, Chrome OS, Linux—every operating system is fundamentally the same, which is to say a very long way from the lines of typed commands that defined the earliest computers

You might be interested in
"open workbench can exchange files with microsoft project by importing and exporting the data in ____ file format."
Leviafan [203]
I believe the answer to this question is XML
5 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
20 examples of input device?
kiruha [24]

Answer:

Computer keyboard,Microphone,Image scanner,Touchscreen,light pen

Explanation:

sorry  that   all  device i  know

8 0
3 years ago
Read 2 more answers
Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
suter [353]

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

<h3>Defenses and Browser Vulnerabilities</h3>

Java script sandboxing defense JavaScript to run in a restricted environment ("sandbox") and limit the computer resources it can access or actions it can take.

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

Java script limit capabilities restrict JavaScript to not support certain capabilities.

Find out more on browser vulnerability at: brainly.com/question/18088367

5 0
2 years ago
How many bytes will you need to represent a double-precision number? A. 1 B. 4 C. 8 D. 2
andrezito [222]

Answer:

a

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Why are variables useful in programming?
    12·2 answers
  • What important information is needed if you are installing an oem version of windows 7?
    6·1 answer
  • What Intel socket recommends the use of a liquid cooling system?
    12·1 answer
  • In 1964 in London, Ontario one could buy a chili-dog and a root beer for $1.25, today the same chili dog and root beer cost $5.0
    8·1 answer
  • Why was the microchip essential to improving computers?
    13·1 answer
  • What is the answer???​
    6·1 answer
  • How long does an online snap application take to process ohio
    6·1 answer
  • If u play codm pls tell me ur username
    9·2 answers
  • Three types of keys on the keyboard​
    15·2 answers
  • Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the pr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!