1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
8

Consider the following scenario below and recommend a solution.

Computers and Technology
1 answer:
sammy [17]3 years ago
5 0

your account has enabled profile pictures for your users, you can manage all profile pictures for your account. Profile pictures are public and automatically approved when users upload an image in their settings. Using profile pictures can make it easier to see the users in your account and managing them gives you the ability to keep the pictures appropriate.

If Gravatars are enabled for an institution in account settings, and a user has a Gravatar but chooses not to upload a profile picture, the Gravatar will display for the user's profile picture.

If a student views another student's user details in a course and reports a profile picture as inappropriate, you can review those profile pictures and approve, lock, or delete the picture. In the courses, instructors can remove profile pictures completely from a user's details page.

You might be interested in
Make a hierarchical directory structure under /root that consists of one directory containing three subdirectories.
Alika [10]
You can make a hierarchical directory structure under /root that consists of one directory containing subdirectories  by using cd and mkdir
the mkdir command created the directories while the cd command changes which directory you're currently in
5 0
3 years ago
Who is Walter Dean Myers
PIT_PIT [208]

American writer of children's books best known for young adult literature

3 0
3 years ago
Read 2 more answers
Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
vitfil [10]

Loops are frequently used to<u> validate data </u>that is, to make sure it is meaningful and useful.

<h3>What are common blunders made by programmers in coding loops?</h3>

Forgetting to initialize and alter the loop control variable are common mistakes that programmers occasionally make. One set of instructions operates on multiple, separate sets of data. Initialized before joining a while loop.

<h3>What are the three steps that should occur in every loop?</h3>
  • Provide a starting value for the variable that will contain the loop.
  • Test the loop control variable to decide whether the loop body executes.
  • Alter the loop rule variable.

To learn more about Loops , refer

brainly.com/question/19344465

#SPJ4

4 0
2 years ago
To provide both encryption and integrity protection, wpa2 uses aes encryption with:
lara [203]

WPA 2 stands for Wi-Fi Protected Access, version 2. It is the latest protocol that effectively protects 802.11 wireless traffic across a LAN. It belongs to the 802.11 protocol.

To provide both encryption and integrity protection, wpa2 uses aes encryption with Counter and CBC MAC (CCM) Mode.

3 0
3 years ago
Pleas help with this question: Which statement about word processing software is true?
deff fn [24]
Short Answer C

The Primary use of any word processor is to create word documents (like this editor) with the ability to format it with bold letters or <u>underlining</u> or <em>italics</em>. There are many other choices of things to do. All your choices are true but the main one is the third one down.

It can do very simple mathematical calculations if it can create tables (neither of which is possible with this editor. A is incorrect.

D is mostly incorrect. Very few word processors have built in capabilities that would help you with word games. There are some that do. Most don't.

I would hate to create fonts using a word processor. It's remotely possible, but anyone in his right mind would try using a program designed for that.. B is incorrect.
8 0
3 years ago
Other questions:
  • If you paste a word document text into an excel spreadsheet, the paste optio allow you to keep source formatting or
    9·1 answer
  • ____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
    6·1 answer
  • "the most common way to access the internet is through ________."
    5·1 answer
  • In Python please.
    13·1 answer
  • Is it safe to take apart a computer monitor?
    13·1 answer
  • Write a program that prints the Grade based on the given data. 95-100: A+ 90-94: A 80-89: B+ 70-79: B 60-69: C+ 50-59: C &lt;49
    9·1 answer
  • Explain the components of Information System?​
    13·1 answer
  • What does f.i.r.s.t stand for in robotics
    15·1 answer
  • Fifty part-time students were asked how many courses they were taking this term. The (incomplete) results are shown below. Need
    6·1 answer
  • Will mark brainliest! What does this code do? What kind of code is this called?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!