1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
2 years ago
7

A selected graphic appears surrounded by a(n) ______, which has small squares and circles around its edges.

Computers and Technology
1 answer:
Elza [17]2 years ago
8 0
Sizing handles :))))))))))
You might be interested in
I have the assembly for the max. can someone change the variables of it and make it min. I mean, the assembly for finding the mi
tatyana61 [14]
Bruh i honeselty dont know
4 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
Why were video games invented?
Alenkinab [10]
The answer is in the following website: https://www.reference.com/history/were-video-games-invented-e9413d3dc1378766


4 0
3 years ago
Which statement is true about the filtering technique? A. You cannot apply multiple filters. B. You cannot remove a filter once
Naily [24]

Answer:

<u>C. You cannot unhide rows by removing filters</u> is the correct statement about filtering technique.

Explanation:

We can apply multiple filters for rows or columns. If we would like to view the data satisfying multiple filters, this option can be used.

Once a filter is applied, it can be removed or added again. The hidden rows or columns will be visible once all the filters are removed. By building a selection list of all the rows that should not be visible, we can hide the rows by removing filters.  

Filters can be applied to any row or column.

5 0
3 years ago
Jack's manager asks him to distribute information and an attachment as quickly as possible to all their clients. In one to two s
snow_tiger [21]

Jack must use electronic communication or e-mail to distribute information and an attachment as quickly as possible to all their clients.  In 1–2 sentences, describe what Jack should do. In this way, he can also retain a hard copy of the memo as well as the attachments used for future reference. 



8 0
2 years ago
Other questions:
  • Which action could be used to determine if a host is compromised and flooding traffic onto the network?
    6·1 answer
  • _____ involves those activities that ensure the orderly dissolution of a system, including disposing of all equipment in an envi
    7·1 answer
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • A patient presents at an outpatient urgent care facility with an acute illness and is seen by a provider. A detailed history wit
    13·1 answer
  • Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
    5·2 answers
  • The data-mining technique that creates a report or visual representation is _____.
    13·1 answer
  • A merchant bank and a merchant have been involved in a Web-based electronic transaction. Which of the following mediates between
    9·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
  • Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?
    6·2 answers
  • The function that overloads the ____ operator for a class must be declared as a member of the class.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!