1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
12

Damian has uploaded an animation he created using Director to his website. However, his friend Teri cannot view the video. What

could be the problem
Computers and Technology
1 answer:
IrinaK [193]3 years ago
3 0
His software might be outdated or he might have the wrong software.
You might be interested in
An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device br
telo118 [61]

Answer:

3. WiFi Protected Access 2

Explanation:

Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.

Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.

Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2

6 0
3 years ago
When planning your website, what is one of the key things you should consider
Alex_Xolod [135]

You should definitely consider what kind of audience you are appealing to. For example, if you were running a business based on cosmetic products you may want to focus your website on self-care and makeup tips rather than something like cooking. By making your website direct about what you offer, the better the audience will understand. This will make your website succeed. Hope this helped :))

4 0
3 years ago
Read 2 more answers
a third important logical element is the inverter. an inverter does pretty much what it says. if the input is 0, the output is 1
Mrrafil [7]

Answer:

xy225.252 <  \geqslant  > . \times 5 \times . =  {?}^{2}

7 0
4 years ago
What can be designed to create annoying glitches or destroy data
Yanka [14]
Viruses can cause this.
3 0
3 years ago
Please complete the following questions. It is important that you use complete sentences and present the questions and answers w
Vanyuwa [196]

Answer:

well... i came for the same answer

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • On the food inventory worksheet, enter a function in cell G1 that counts the number of Food Items. What formula would i use!? Th
    5·1 answer
  • What does LMS Date Updated mean?
    9·1 answer
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • To find your personal learning style you can
    5·2 answers
  • Join my discord server! CODE IS (CebjBXN)​
    12·2 answers
  • A USB device used to transfer photos from the memory card to a hard drive is called a _____.
    5·2 answers
  • Will, there be any presents this year
    15·1 answer
  • Which actions represent parody?
    5·1 answer
  • What are two reasons to tie cables up and out of the way inside a computer case?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!