1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
11

How does this app work?

Computers and Technology
2 answers:
Natali5045456 [20]3 years ago
6 0
Answer questions (don’t put random things because you can get reported and possibly suspended) to get points.

The points are needed to ask questions.

If a question helped you, you can rate it or give a thanks (click the ❤️)

For the questions you ask, you can give brainiest to the best answer. Giving brainiest helps the person you gave it to, and it gives back some points you used for the question.

If you have any more questions, feel free to ask. As always, I hope this helps and hope you have a great day and brainiest is always appreciated.
sergeinik [125]3 years ago
6 0

If you have any questions you can ask this app like when I had a math problem I didn’t know how to do it so I typed it in and someone gave me the answer and they explained how they did it so now I understand the math homework or you can search what the problem says like how many presidents are there? Someone may have asked that so you can click on the question and some other people may have answered it so you can see what the answer is this app is kinda like a chest sheet

You might be interested in
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
1 year ago
What is the purpose of a web server? What is the purpose of a web browser?
Sauron [17]

Answer: the purpose of a web browser is to help answer and needed questions, and to get to sites.

Explanation:

4 0
2 years ago
If you want to selectively darken an area of an image you could use the
DerKrebs [107]
Create an adjustment layer and create a hue and saturation layer. You'll see sliders so adjust them to your liking. next select a layer mask and fill it will black. then select which areas you want to darken and use the wand tool. Apply a gradient mask if you want. 
5 0
3 years ago
You can access cloud files from any computer smart phone or tablet as long as it is connected to the Internet is it true or fals
Zepler [3.9K]

Answer:yes

Explanation:

because it is the internet

8 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Other questions:
  • Sleeping is an effect of _______ , but agitation may cause a person to wake up
    7·2 answers
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • Which partitioning method must you use for a 4-tb hard drive?
    13·1 answer
  • What does email etiquette mean?
    14·1 answer
  • Gmod how to make someone admin on a lan server
    6·2 answers
  • George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
    6·1 answer
  • Define Based Assessment ​
    5·1 answer
  • 17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
    8·1 answer
  • 25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • What defines the scope of a project?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!