1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
5

The Quick Access Toolbar cannot be customized and have extra commands added to it

Computers and Technology
1 answer:
sattari [20]3 years ago
4 0

false

plz mark brainliest


You might be interested in
An online bank wants you to create a program that shows prospective
ladessa [460]

Answer: I can't really code a whole thing for you but use VS Code for this it'll make your life easier in the long run.

8 0
2 years ago
Which statement best describes a social impact of computing on the world?
DiKsa [7]

Answer: Smartphones have changed the way people communicate through text messages and emojis.

Explanation:

it would only make sense that this is the correct answer because globally smartphones are used for communication, considering the fact that we dont tend to write letters to people across the country as our main source of communication, or in a different continent all together. The steady growth of technology has clearly made getting in touch with people of all nations much easier.

3 0
3 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
How to take a key off a keyboard without breaking it?
klio [65]
You can carfully wedge something in between the key and gently pull up 
4 0
4 years ago
Transparency is an important concept in policies related to the handling and use of customer data. Organizations should be trans
Tpy6a [65]

Answer: (C) Response controls

Explanation:

  According to the given question, the response control is not the necessary element while handling the users or customer data as compared to all the other given options that is individual participation, data minimization and the purpose specification.

  • The response control is basically used for exchange the data or any information in an organization but the main disadvantage is that they share all the response and information as they not wait for the request from the users.
  • The all the three other given options expect response control are the important element for handling the customer data as it helps in maintaining the Personal information.  

 Therefore, Option (C) is correct answer.  

6 0
3 years ago
Other questions:
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • Complete the sentence.<br> A ___ number is composed of only zeros and ones.
    8·1 answer
  • Write a program which asks the user for their name and age. The program should then print a sentence.
    14·1 answer
  • If you were any type of fnaf charater who would you be and why?
    10·2 answers
  • Can someone help me?
    10·1 answer
  • Whats with the bot spamming customer care numbers...kinda annoying when im trying to help people.
    12·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • Privacy, anonymity, and freedom of expression are all interrelated.
    12·1 answer
  • If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.
    7·1 answer
  • Ethics related to all <br> artificial intelligence?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!