1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
3 years ago
10

The dashed lines that display on your slide when you are moving an object are

Computers and Technology
1 answer:
diamong [38]3 years ago
6 0
The answer is "smart guides".
You might be interested in
A recursive definition is a definition:____.
saveliy_v [14]
The correct answer is D
6 0
3 years ago
When is a handrail required for stairs
ch4aika [34]

Answer: when is not able to get up the stairs like a normal person

Explanation:

5 0
3 years ago
Read 2 more answers
How important are operating system in our devices?​
TiliK225 [7]

Answer:

Explanation:

An operating system is the most important software that runs on a computer. ... It also allows you to communicate with the computer without knowing how to speak the computer's language. Without an operating system, a computer is useless.

6 0
2 years ago
Read 2 more answers
You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB
nadezda [96]

Answer:

By order of increasing magnitude:

D. Make sure the USB device is plugged in properly.

A. Try a different USB cable.

B. Replace the USB device.

C. Install a new USB controller card.

Explanation:

Start with whatever is simplest first. Most errors are simply ID-10-T mistakes.

3 0
3 years ago
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order
Novosadov [1.4K]

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

3 0
3 years ago
Other questions:
  • What is a Web application?
    12·1 answer
  • Whatis meant by Translation Lookaside Buffer?
    5·1 answer
  • Consider this program: Cost1 = input("Please enter the first expense: ") Cost2 = input("Please enter the second expense: ") prin
    6·1 answer
  • Write a program to read a record from a binary file
    8·1 answer
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • Which of these parts of a computer produces an observable result?
    11·2 answers
  • Which sentence indicates that Jeff is mentioning the visual synopsis in his proposal while planning a media project?
    10·1 answer
  • What is real time os ?​
    13·1 answer
  • What underlying concept is edge computing based on?
    13·2 answers
  • The success of Eye of the storm exemplifies
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!