1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
4 years ago
12

(ii)Give two uses of the Start Menu.​

Computers and Technology
1 answer:
9966 [12]4 years ago
7 0

Answer:

used folders, files, settings, and features. It's also where you go to log off from Windows or turn off your computer. One of the most common uses of the Start menu is opening programs installed on your computer. To open a program shown in the left pane of the Start menu, click it

You might be interested in
Which activity should be part of a long-term plan to positively affect your
STatiana [176]
D that is the answer but I need 20 words to send this text
5 0
3 years ago
What is Access? When would you use Access instead of Excel?
SpyIntel [72]

Answer:

Access is a database management system from Microsoft.

Explanation:

Access allows users to view, edit and delete data, manage database tables, forms, queries, reports and macros.

Access should be use instead of Excel when you need to manage data and have it organize, easy to search and available to different users. If you need to be able to track information that is in different categories but is related, Access is a better option.

4 0
4 years ago
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is l
Ratling [72]

Answer:

Option c (byte alignment) is the appropriate alternative.

Explanation:

  • This same alignment problem emerges if another architecture does seem to be an application-specific byte, however, the design phrase set education seems to be greater within one byte. In these kinds of case scenarios, because when recovering a significance from people's memories the structure can come back less than half including its bits.
  • If memory access isn't synchronized, it seems to have been unevenly spaced. Recognize that even by interpretation, byte storage access has always been connected.

Some other choices aren't connected to the type of situation in question. So the above is the right option.

4 0
3 years ago
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
Forwarded events can only be recorded when systems ADMINISTRATORS have de-established an event subscription. TRUE or FALSE
weeeeeb [17]

Answer:

True

Explanation:

Forwarded events can only be recorded when systems administrators have de-established an event subscription.

8 0
3 years ago
Other questions:
  • Read the scenario, A manager wants to hire a new technician for the help desk that typically assists clients with simple compute
    10·1 answer
  • Plz answer me will mark as brainliest ​
    7·2 answers
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • The following Mic1 microcode excerpt shows support for a possible 7 bit opcode, 8 bit integer argument machine instruction (orga
    14·1 answer
  • Assume you define a vector in the following way:
    5·1 answer
  • Mention three types of pipeline hazards​
    6·2 answers
  • Complete the code to create a new file.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!