1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
2 years ago
6

How to adjust screen from 1024x728 to 800x600

Computers and Technology
1 answer:
densk [106]2 years ago
5 0
Goto settings>display>resolution what os is your system? this was for a win 10
You might be interested in
Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on
alexdok [17]

Answer:

The port that should be set open to allow users to access this new server is:

TCP port.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

5 0
2 years ago
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
yarga [219]

Answer:

Intrusion detection systems

Explanation:

Intrusion detection systems (IDS) are systems designed to monitor network use for any potential hacking or suspicious activity and then take measures to issue alerts upon discovery of such activity. IDS are applications that help secure a network or system from policy breaching or other activities that may be harmful to the network. There are four major types of IDS and they are: Perimeter Intrusion Detection System (PIDS) , Network intrusion detection system (NIDS), VM based Intrusion Detection System (VMIDS), and Host-based intrusion detection system (HIDS) .

7 0
3 years ago
categorize each job role as an administrative job or management job auditor director legal secretary payroll clerk etc ​
abruzzese [7]

Explanation:

look after the office jobs

3 0
2 years ago
For this project, you'll be given information to create a business report using word processing software. Suppose you want to op
fiasKO [112]

Answer:

Business Plan: for a Car Wash company

Tools and ingredients required: Water tanker: $250s, Self-service water supply set up: $160s. two helpers one for washing, and one as cashier: $1000s per month Salary, water supply: through boring, one-time expense :$1000s. A place ( in the ready state apart from above-mentioned requirements) one rent: $800s monthly rent.

Total investment required: $4210s + $2000s( as security).= $6210s.

Work Details:

The car will be washed with water. And we have not mentioned the Mobil here, as that work will be outsourced. A petrol pump employee will always be at the car wash center to apply the Mobil to the vehicle after washing. And the only vehicle entertained is the car, however, the model of the car does not matters.

The income is daily deposited in the company bank account, and digital payment is also accepted.

Hope our car wash business succeeds.

Explanation:

Please check the answer section.

3 0
3 years ago
Document design techniques make your document easier for readers to skim. Therefore, these techniques give your writing "High Sk
USPshnik [31]

Document design techniques that make your document easier for readers to skim and therefore gives your writing "High Skim Value" is true. The answer is letter A. Documents that give you a high skim value are the headings and subheadings, white space and the toposgraphy.

3 0
3 years ago
Other questions:
  • A network administrator needs information about the printers that employees can access. Where can he find the information? The a
    10·2 answers
  • As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed a
    9·1 answer
  • Which of the following jobs is considered part of the information technology industry?
    15·2 answers
  • Question 16 of 20
    12·2 answers
  • (20 POINTS AND BAINLIEST)
    9·1 answer
  • How is the bootstrap program started?
    6·2 answers
  • Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
    11·1 answer
  • What is a trojan horse
    8·2 answers
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
  • Blockquote
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!