1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
4 years ago
5

The picture that graphically represents the items you use in windows is called a/an

Computers and Technology
1 answer:
rodikova [14]4 years ago
3 0
The picture that graphically represents the times you use in windows is called an icon ( this is true for windows 7, assuming that was what you were referring to. I am not familiar with windows 8)
You might be interested in
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
2 years ago
Blender questions
Arisa [49]
Hey 

7 is true 

8 <span>
the user preference settings</span>
6 0
3 years ago
What is software infrastructure?
Setler79 [48]
Software-defined infrastructure (SDI) is the definition of technical computing infrastructure entirely under the control of software with no operator or human intervention. It operates independent of any hardware-specific dependencies and are programmatically extensible.
4 0
3 years ago
after a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your pin. because it
riadik2000 [5.3K]

The reason that you have not been locked out after several failed PIN login attempts is that your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

Technology known as Trusted Platform Module (TPM) is made to offer hardware-based, security-related functionality. Designed to perform cryptographic operations, a TPM chip is a safe crypto-processor. Malicious software cannot interfere with the TPM's security capabilities, and the chip has numerous physical security features to prevent tampering. Utilizing TPM technology has a number of major benefits, including the following:

  • Cryptographic keys should be created, stored, and used sparingly.
  • Utilize the burnt-in RSA key of the TPM to authenticate platform devices using TPM technology.
  • By recording security metrics, you can assist in ensuring platform integrity.

To learn more about TPM click here:

brainly.com/question/10742732

#SPJ4

7 0
1 year ago
Which statement is true?
Finger [1]

Answer:

ion you d goal so P so o so so k well join so lil co got shot do don't still l help dunno look day cream still full from drive are all all all of it by no means fr by by cry see we co

3 0
4 years ago
Read 2 more answers
Other questions:
  • The LList class is (mostly) the same one discussed in lecture, but you must write a sort() function that uses one of the three i
    8·1 answer
  • Standards for all managers ethical responsibilities are covered in a company's
    7·2 answers
  • Explain how to identify a starting position on a line.
    15·2 answers
  • A __________ network is good for connecting computers over boundaries.
    6·2 answers
  • IF ACCURATE = BRAINLY (if u answer rubbish randomness= reported AND if you got questions dont ask in answer slot= reported)
    13·1 answer
  • How is a correction made to an Electronic health record?
    14·1 answer
  • Type the correct answer in the box.
    5·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • What are the difference among the whole note, half note and quarter note ? (this is music)
    12·2 answers
  • What is the initial condition in this set of code?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!