1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
7

Dan needs to ensure that delegates as well as those looking at his shared calendar information are unable to see the details of

a particular calendar event. Which option should he use to achieve this?
Computers and Technology
1 answer:
Klio2033 [76]3 years ago
3 0

Answer:

If Dan uses Google Calendar application, he may edit the public visibility to "private" mode. Then, only the host of the meeting can see details. Usually can he hide the guest list but the meeting agenda is unlikely.

Explanation:

You might be interested in
Please I want help on this question <br>I want the answer quickly because I have test<br>​
Nikitich [7]

Answer:

RIGHT 90

PENDOWN

REPEAT 6

FORWARD 100

LEFT 60

END REPEAT

Explanation:

I hope this helps a little bit.

5 0
3 years ago
6. A presentation is widely used to present and effectively​
dalvyx [7]

Answer:

A Presentation is a collection of slides arranged in a systematic order. 2) A presentation ...

Explanation:

Please give thanks to all my answers and please mark as brilliant and please follow me

5 0
3 years ago
B) State two factors that may cause interference of the WiFi signal for his network
iVinArrow [24]

Answer:

Ping

Mbps Speed (Download or Upload)

Brainliest Please.

Tell me if im right please!!

4 0
2 years ago
How is it possible that water is in 2 different spheres?<br><br><br> use it in a sentence please
const2013 [10]
Dndjdbhrjehejejejeje
8 0
2 years ago
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
2 years ago
Other questions:
  • ____ are types of changes that occur when text has been omitted from a document and must be inserted later.
    10·1 answer
  • ____ software is used to block unwanted e-mail and is available at many levels.
    8·1 answer
  • In this mode, your presentation will fill up the entire screen. Auto Default Standard Window
    6·2 answers
  • 11. The golden rule of safe driving is: A. Always drive at the posted speed limit B. Never drive while physically or mentally im
    6·1 answer
  • You are studying at the library and someone at your table has some great study material. both of you have an ipad with you. you
    14·1 answer
  • What to do when the tool bar for paint tool sai dissapears?
    12·1 answer
  • Assume that a single page of printed text requires 52 lines of text, and that each line of text averaged 80 characters. If each
    9·1 answer
  • What is the effects of computer and internet attacks​
    11·2 answers
  • Davingould1115...................answer 3​
    11·1 answer
  • Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!