1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
15

Please help again if anyone doesn't mind

Computers and Technology
1 answer:
Andrew [12]3 years ago
3 0

Answer:

D

Explanation:

You might be interested in
Application area of word processor?​
kompoz [17]

Answer:

  1. Typing, editing,and printing different types of document .
  2. Formatting text, paragraph , pages for making attractive document .
  3. Checking spelling and grammar of document for making it error free.
  4. Inserting and editing pictures , objects, etc.
  5. Adding watermark , charts , quick flip, etc.
7 0
3 years ago
Read 2 more answers
Use the drop-down menu to identify which command is used to do the activities.
Ronch [10]

Answer:

1.  save and save as

2. save as

3. save as

4.save as

5. save and save as

Explanation:

just took did the question

6 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
What does NBT stand for?​
Zanzabum

Answer:

National Benchmark Test

Explanation:

7 0
3 years ago
Manufacturing product designs must be tested before they are put into production. Who is responsible for this?
hammer [34]

For testing the designs of the product prior to putting it into production, mechanics should be responsible for the same.

The information related to the mechanics engineers is as follows:

  • They are responsible for manufacturing & designing of machines & products.
  • It is the engineering branch.
  • Moreover, they are fully responsible for developing things.

Thus we can say that for testing the designs of the product prior to putting it into production, mechanics should be responsible for the same.

Learn more related to the production here: brainly.com/question/22852400

4 0
2 years ago
Other questions:
  • Which toolbar is located next to the office button and contain the commonly used commands​
    15·1 answer
  • Many programmers today use a(n) _________, which is software that helps them build their computer programs. eula cad sdlc ide
    15·1 answer
  • Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
    5·1 answer
  • 次のうち、ビジネスレターに適したフォントとポイントサイズの選択はどれですか?<br> 私を助けてください!私はあなたを最高にブランコにします!
    12·2 answers
  • Name two ways you can identify the pid number of the login shell.
    13·1 answer
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • What is the meaning of photography​
    5·2 answers
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • What is the value of the variable result after these lines of code are executed? &gt;&gt;&gt; a = 5 &gt;&gt;&gt; b = 2 &gt;&gt;&
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!