1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
4 years ago
7

What does it mean when your phone says system ui has stopped?

Computers and Technology
1 answer:
wel4 years ago
8 0
It means hat the CPU is taking o much of what the phone can normally do try delete some apps or close apps your not using 
You might be interested in
Which naming scheme identifies the columns of a worksheet?
faltersainse [42]

Answer:

In Worksheet the row are represented in 1, 2, 3, form in sequence No. of rows in one work sheet is 1048576.

And Column represented in A, B, C  form. Column A mean 1st Column, B means 2nd this sequence goes on up to XFD means 16384th column

Naming sequence is A, B, C, ...XFD


3 0
4 years ago
When was kale discovered?
anyanavicka [17]
Kale was discoverd just 2 years ago ........
8 0
4 years ago
It's inventiveness uncertainty and futuristic ideas typically deals with science and technology ......what is it.
marshall27 [118]

Answer:

Necessity is the mother of invention, technology is a tool to aid invention, and science is exploratory means to new ideas and information to approach our future with preparedness.All are necessary and need to be balanced and scrutinised.

Explanation:

5 0
3 years ago
Though most of the content on this social network is uploaded by amateurs, many companies offer streaming video content related
Nikitich [7]
The answer to this is the youtube channel. The youtube channel is very common and very popular to everyone. Each and every one of us could not deny that we would watch a video from youtube maybe at least once a day. Youtube is very effective, it is also very efficient and easy to use.
6 0
3 years ago
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • What actions are considered positive body language?
    12·1 answer
  • Create 3–5 questions about your data that can be answered by sorting and filtering the database.
    8·1 answer
  • In this lab, you will write a function called numberGuessingGame(). When the function is called, it will do the following: gener
    13·1 answer
  • Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets infected with a vir
    12·1 answer
  • Create a page using PHP for a business website that will ask the user to enter his or her name into text boxes and will display
    5·1 answer
  • D) Software which is basically language translation software.​
    11·1 answer
  • Here is what my rob-lox user USED to look like, btw what is better, Samsung or apple?
    13·2 answers
  • Does the following code return a string or a number def of() return 3
    12·1 answer
  • A company is concerned that hackers may gain access to its computer system or that it may be
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!