1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
6

Match the items with their respective descriptions.

Computers and Technology
2 answers:
kap26 [50]3 years ago
7 0

a is 3

b is 1

c is 2

d is 4

gizmo_the_mogwai [7]3 years ago
3 0

Answer:

page orientation- landscape and portrait

page margin- wide and narrow

scale to fit- width and height

paper size- envelope and letter

Explanation:

Got it right on Plato

You might be interested in
What is computer fundamental ?
dimaraw [331]

Answer:

It is derived from the Latin word "computare" which means to calculate. Our Computer fundamentals tutorial includes all topics of Computer fundamentals such as input devices, output devices, memory, CPU, motherboard, computer network, virus, software, hardware etc

7 0
1 year ago
When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit,
zysi [14]

Answer:

2. testing cybersquatting

Explanation:

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. In this case, phishing domain refer to a domain that is not a trustworthy one but try to deceive user into using it in place of the genuine domain.

Cybersquatting also known as domain squatting is registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses.

Identity theft is the illegal use of someone else's personal information in order to obtain money or credit. It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

From the above definition, it is seen that someone registering a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit is called testing cybersquatting.

3 0
3 years ago
Read 2 more answers
Why do we use the internet so much?​
allochka39001 [22]

Answer:

We use the internet because it is a way of finding certain things out that we do not know or a better way of communicating to people who are far away instead of sending a letter to them and it taking 2 to 3 months for it to get to that person.

Explanation:

Your welcome

4 0
2 years ago
How do programmers recognise patterns, generalise and abstract information
Dima020 [189]

Answer:

Pattern recognition is the process of recognizing patterns by using machine learning algorithm. ... In a typical pattern recognition application, the raw data is processed and converted into a form that is amenable for a machine to use. Pattern recognition involves classification and cluster of patterns

Explanation:

4 0
3 years ago
Meaning of 'WSAD" iiiiii
Anit [1.1K]

Answer:

Websphere Studio Application Developer

7 0
3 years ago
Read 2 more answers
Other questions:
  • True or False. It is required to restart the client computer after the DLP agent has been installed.
    9·2 answers
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • Numeric data is stored in ___________ for direct processing.
    6·2 answers
  • When I try to invite someone to be my friend on brainly, for some people, it says, "Somethings up. Invitation wasn't sent". Can
    8·1 answer
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web s
    13·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • I need a utube name for a gaming channel....PLEASE HELP...BRAINLIEST
    5·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • Identify a characteristic that is a disadvantage of cloud-based hosting.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!