1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
13

The ash and dust from a volcanic eruption can cause a _______ change in the environment.

Computers and Technology
1 answer:
ad-work [718]3 years ago
3 0
Dramatic change in the environment?
You might be interested in
Need help with this​
VladimirAG [237]

Answer:

Get out of coding asap

Explanation:

coding is really boring

4 0
2 years ago
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
¿En qué países se ha implementado un sistema de vigilancia a través de drones?, ¿qué aspectos positivos y negativos ha generado?
mel-nik [20]

Answer:

17 países.

Explicación:

Hay diecisiete países que tienen vehículos aéreos no tripulados armados y donde se ha implementado un sistema de vigilancia con drones. Los drones son excelentes para recopilar grandes cantidades de datos de imágenes. Se puede implementar fácilmente para la vigilancia y mantener la seguridad. Se puede conducir a través de la computadora, no del piloto en él, por lo que el piloto se guarda. Los aspectos negativos de los drones es que tienen tiempos de vuelo cortos y el clima puede afectar fácilmente a los drones. Las operaciones precisas son difíciles y también eliminan futuros trabajos.

7 0
2 years ago
Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following
jok3333 [9.3K]

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

4 0
2 years ago
Different uses of quick access toolbar
zhannawk [14.2K]
“The Quick Access Toolbar provides access to frequently used commands, and the option to customize the toolbar with the commands that you use most often. By default, the New, Open, Save, Quick Print, Run, Cut, Copy, Paste, Undo, and Redo buttons appear on the Quick Access Toolbar” -Information Builders
5 0
3 years ago
Other questions:
  • What are the pasting options in Outlook 2016? Check all that apply.
    10·2 answers
  • The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
    12·1 answer
  • The Python print function
    9·1 answer
  • Do you agree that technology can be used to commit acts of violence ? Explain why or why not
    11·1 answer
  • Which documents might an employer expect to find in a career portfolio?
    15·2 answers
  • The first page of a website is what?​
    5·2 answers
  • Complete the sentence.<br> Python is a_____<br> level language compared to bytecode.
    7·2 answers
  • I WILL MARK BRAINLEST FOR THIS!!!
    10·1 answer
  • What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an ads
    11·1 answer
  • Create a program that prompts the user for a positive integer then prints a right-aligned pyramid using that number using the st
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!