1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
3 years ago
11

How do you name somebody brainiest on brainly? This may sound silly but I don't know how to. The first person who explains it th

e best I will try to name them brainiest!
Computers and Technology
1 answer:
Art [367]3 years ago
6 0

If two people answer then you can mark them as brainiest at the bottom of their name!

You might be interested in
How many possible keys does the playfair cipher have? an approximate power of 2
Lorico [155]
I don't know but I am guessing 666 or 777 or 888.
7 0
3 years ago
Who plays warzone im a roze sweat and ill try to carry with loadout
alexira [117]

Answer:

I type play warzone- If u wanna add me my user is Chachee_Girl. Dont ask- and im on ps5

8 0
2 years ago
"________ are used to edit videos to enhance quality and appearance."
AveGali [126]
Video editors are used to edit videos making them more visually pleasing in quality and appearance. They are very popular nowadays when people are fond of taking videos and uploading them to social networking sites. Examples are Adobe Premier PRo, Sony Vegas Movie studio and Lightworks.
5 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
What feature did we use to quickly apply the formatting shown in this image?
hammer [34]

Answer:

Conditional formatting.

Explanation:

Conditional Formatting is the method that main objective to enabling the users for setting the formatting to the  cell or the cell range as well as it adjust the layout based that are based on the cell value or the formula value.

  • The Conditional formatting making the cell value as bold as in the given question we see that the cell value is bold  when the given condition is true.
  • The objective of pivot table is to summarizing the data it do not provide the formatting that's why this option is incorrect .
  • The objective of what if analysis is altering the absolute value of worksheet also it see how some modifications will influence the result of the worksheet formulae in the spreadsheet it do not provide the formatting that's why this option is incorrect .
  • Data scenario formatting do not provide the formatting that's why this option is incorrect .

3 0
3 years ago
Other questions:
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    8·1 answer
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.
    9·1 answer
  • Reversing the elements of an array involves swapping the corresponding elements of the array: the first with the last, the secon
    6·1 answer
  • Most operating systems today primarily use a ____.
    12·1 answer
  • When you _____ a scroll bar, a shortcut menu appears with commands related to the scroll bar
    10·1 answer
  • A browser allows you to set preferences for using the browser. These preferences include all of the following except
    7·1 answer
  • 3.19 LAB: Seasons In C++ Write a program that takes a date as input and outputs the date's season. The input is a string to repr
    15·1 answer
  • What is computer generation.<br>name that generations ​
    9·2 answers
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!