1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
5

The Quick Access Toolbar cannot be customized and have extra commands added to it

Computers and Technology
1 answer:
sattari [20]3 years ago
4 0

false

plz mark brainliest


You might be interested in
What does core mean? what are they for?​
xeze [42]

Answer:

what does core mean? what are they for?​

Explanation:

A core is located inside the CPU its the part that gives instructions to software to preform a certain task, the more cores, the faster software can preform a task

4 0
3 years ago
The county clerk's office is writing a program to search their database for citizen records based on information about that citi
Alborosie

Answer:

The correct pseudocode to find the records of all citizens over the age of 50 is IF(age > 50).

OR EACH item IN citzlist

{

WHILE(not end of citzlist)

{

IF(age > 50)

{

DISPLAY(name)

}

}

}

If this is run, it will bring out all the names of the citizen who are over the age of 50 in the list.

Explanation:

6 0
3 years ago
Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
lilavasa [31]

Answer: C) DNS poisoning

Explanation: DNS poisoning or DNS cache poisoning is the type of attacking tendency towards the URL of the computer. These attempt to attack the URL using the spam mails and the user usually end up clicking on the URL provided by the attacker which invokes attack in the computer.

This mechanism takes place in the emails as well as the selected websites which can be accessed by the users easily.These attacks once enter the system seems like the real thing and become prone to many risks .

6 0
3 years ago
5) Write a regular expression would zip code + 4 fields of the forms: xxxxx-xxxx where x is any number but the last 4 digits cou
marusya05 [52]

Answer:

Following is the expression written in "Bash script" (mixture of commands):

^\d{5}(?:[-\s]\d{4})?$

Explanation:

  • ^ = For staring string (denotation).
  • \d{5} = Matching 5 digits (first five unknown x's)
  • (?:…) = Making Group (making group of former 5 digits)
  • [-\s] = Match a hyphen  or a space

                 (checking if a hyphen is present?)

  • \d{4} = Matching 4 digits (next four unknown x's)
  • …? = Pattern before it is optional
  • $ = Ending of the string.(denotation)

4 0
3 years ago
Which devices are most likely to communicate with the internet? Select 3 options.
Anon25 [30]
<h2>Answer:</h2>

<h3>smart phone </h3>

<h3>cars </h3>

<h3>delivery trucks</h3>
5 0
3 years ago
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Lesson 1 (4.0 points)
    13·2 answers
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    14·2 answers
  • Mary needs to choose the menu in order to place the text in a desired fashion around the image.
    14·2 answers
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • The road is closed a head
    9·1 answer
  • The following are part of characteristics of a software requirement specification.
    6·1 answer
  • What is a cookie? *
    9·2 answers
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!