1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
14

What did do you do if you made a mistake on a computer?

Computers and Technology
2 answers:
Andrej [43]3 years ago
5 0
Get ADW cleaner, and ccleaner. It will work on almost any bug. It basicley wipes out cache (ccleaner), and cleans ad ware off your device (ADW). If it is something else email, a snap shot of your problem. My email is, [email protected] Rate me crown me thank me. If it really helped, crown me. If it helped, thank me. Rate me, and comment.
forsale [732]3 years ago
5 0
The answer to your question truly depends on the mistake you made. If you told me more of what the problem was I could help. =)
You might be interested in
Discussion Topic:
hodyreva [135]

Answer:

Prevents lagging

Explanation:

This prevents the website from being slow and upto shape so those who access it dont have difficulties

7 0
2 years ago
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
MARKING BRAINLIEST
BabaBlast [244]

Answer: Well, first of all, you might want to change websites. I suggest khan academy.

anyways if your a begnner *Like me* The you might wanna try Java Script! in other words i do not know how to work Python

8 0
3 years ago
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
Where can you find detailed information about your registration, classes, finances, and other personal details? This is also the
Andre45 [30]

Answer:

A. UC ONE Self-Service Center

Explanation:

The UC ONE Self-Service Center is an online platform where one can get detailed information about registration, classes, finances, and other personal details. This is also the portal where one can check class schedule, bill payment, viewing available courses, checking final grades, book ordering, etc.

it gives students all the convenience required for effective learning experience.

The UC ONE platform is a platform found in the portal of University of the Cumberland.

4 0
3 years ago
Other questions:
  • Rewrite this method so that it avoids the use of a return statement:
    15·1 answer
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • Name the six parts of the product development life cycle.
    7·2 answers
  • Interactive sites where users write about personal topic and comment to threaded discussion are called?
    10·2 answers
  • Which of the following is true regarding data acquisition? Because data acquisition is often technical, the research team does n
    15·2 answers
  • Which of the following statements is TRUE of the information systems (IS) department? A. The operations group monitors user expe
    8·1 answer
  • Excel spread sheets are primarily used to
    13·2 answers
  • When data can flow across a cable in both directions, this is known as___Communicating?
    15·1 answer
  • Which of the following is NOT a common grammar adjustment which is identified by grammar-check software?
    6·1 answer
  • 2. As you have learned, ironically, a large part of sound production involves visual perception. How easy or difficult did you f
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!