1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
5

Help pls. Computer basics.

Computers and Technology
2 answers:
telo118 [61]3 years ago
8 0
Text boxes and related tools
coldgirl [10]3 years ago
4 0

Answer:

The answer is Text boxes and related tools....

You might be interested in
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
A digital camera is an_____​
garik1379 [7]

ITS ABOUT DRIVE

ITS ABOUT POWER

WE STAY HUNGRY

WE DEVOUR

PUT IN THE WORK

PUT IN THE HOURS ⌚

AND TAKE WHATS OURS

Explanation:

fr what is it?

7 0
3 years ago
Read 2 more answers
Why is a non-trivial or predictable classification system preferred in systematics?
spayn [35]
A non-trivial or predictable classification system is preferred in systematics for the reason that, it is <span> repeatable, objective, testable and </span>predictable. Predictable in a way that you <span>get more out of it than what you put in it. Hope this answers your question.</span>
4 0
3 years ago
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
Which type of server and network topology is preferable in a bank?
Mariana [72]

Answer:

1. Database

2. Tree

<u>Database</u>

An organized collection of data, that is stored form different computer system is called Database.

<u>Tree Topology</u>

A type of network in which multiple computers are connected in a tree like structure. This type of network topology is used to organize data in database.

<u>Explanation</u>

In banks database servers are used to organize and store large volumes of financial data.

<em>To organize such type of data with the help increasing number of employs on database, tree topology is used to connect all computers of that bank on the network,</em>

3 0
4 years ago
Other questions:
  • The next page and previous page buttons allow you to navigate through a worksheet while in print preview mode.
    6·1 answer
  • Each array in Java has a public field named ________ that contains the number of elements in the array.
    13·1 answer
  • The _____ element of the wsdl describes the data being exchanged between the web service providers and the consumers, including
    12·1 answer
  • Directions: Using the decoder key and the code chart on the second page, find out the name that has been coded. After coding the
    15·1 answer
  • Which of the following is not a SQL*Loader file?
    11·1 answer
  • Someone learn me more American Sign Language (ASL). Please.
    13·1 answer
  • To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro
    6·1 answer
  • Https://www.blooket.com/play?id=300932<br> please
    8·2 answers
  • The following SQL is which type of join? SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,OR
    15·1 answer
  • Which program assesses and measures improper medicare fee-for-service payments (based on reviewing selected claims and associate
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!