1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
12

What will empty the log of Internet sites you have recently viewed

Computers and Technology
2 answers:
melomori [17]3 years ago
6 0
On google- on the top right of the screen, there is a box with a number on it that will show how many tabs you have up. Click on it and empty the sites.
On your phone- If it's an Iphone, you double click the button on your phone.
hjlf3 years ago
3 0
You must go to your browser. Then go to settings. After that go to history. Then, clear browsing history. This will not clear websites from your internet provider or work.
You might be interested in
"if" statements are part of creating computer programs, what are these instructions called and how would you use them?
podryga [215]

Answer:

if means that like (if this happen it will come or not come answer)

Explanation:

sorry I don't know how to tell but plz reply if you understand or not.

7 0
3 years ago
Read 2 more answers
__________ is a protocol used by e-mail clients to download e-mails to your computer.
arlik [135]
POP is a protocol used by e-mail clients to download e-mails to your computer. The correct option among all the options that are given in the question is the last option or option "d". The full form of POP is Post Office Protocol. After the email has been downloaded, the email gets erased from the server automatically.
7 0
4 years ago
How to make a negative number positive in excel
Viefleur [7K]

Answer:

DB * -1

Explanation:

Use this formula: DB * -1

DB = Desired Box

DB * -1

4 0
3 years ago
When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points.
MatroZZZ [7]

CTRL/CMD + B (BOLD)

CTRL/CMD + U (Underline)

CTRL/CMD + ] or [ (change font size)

6 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Other questions:
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • what would happen if a large number of computer users are attempting to access a web site at the same time that you are
    15·2 answers
  • List the six external parts or "peripherals" of a computer system and identify which are the output and which are the input devi
    6·1 answer
  • The __________ format is a proprietary file format defined by guidance software for use in its forensic tool to store hard drive
    15·1 answer
  • A teacher wants a program to give extra points to students who fail a test. Write a Python program to do the following: (a) Ask
    5·1 answer
  • A quien se le conoce como el padre de la tecnologia?
    10·1 answer
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • Dgvdsgf cvdzgb fgvsdxchygfdrzvdszfgvsdzxd
    9·1 answer
  • Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par
    12·1 answer
  • 4.8.4 Better Sum
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!