1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
3 years ago
12

Similarities between drawing toolbar and editing toolbar​

Computers and Technology
2 answers:
Aleksandr-060686 [28]3 years ago
5 0

Answer:

they are both places where tools are found for typing

topjm [15]3 years ago
3 0

Answer:

dk

Explanation:

You might be interested in
Is this App for real?​
zhannawk [14.2K]

Answer:

Yeah?

Explanation:

I use it to do my homeworks lol

7 0
3 years ago
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
A laptop computer manufacturer would consider the computer's processor chip to be a(n) ______ cost.
erastovalidia [21]

Answer:

direct material

Explanation:

if you need anymore help let me know

3 0
3 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity
Anna71 [15]

Answer:

Size

Explanation:

thats it thats the answer

8 0
3 years ago
Other questions:
  • True are fulse A piece of information that is considered common knowledge does not need a citation
    5·2 answers
  • When did gaming become a thing?
    7·2 answers
  • Which of the following is a valid variable name? a. salesTax b. input-string c. 25Percent d. double
    8·1 answer
  • When including multiple images in a report, it may help to create a _____ on each image so you can cross reference them througho
    11·1 answer
  • When dealing with a person who is behaving violently you should argue with them. A. False B. True
    5·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Where can formatting features be found ?! Need help asp !‍♀️
    9·1 answer
  • How can she change that value so it is reflected in the chart in her presentation?
    5·2 answers
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
  • Given a number n, for each integer i in the range from 1 to n inclusive, print one value per line as follows:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!