1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
2 years ago
11

Marla wants to transfer photos from her digital camera to her computer. She has plugged the camera's cord into the USB port. Wha

t should she do next?
A. Make sure the camera is turned off.
B. Make sure the camera is turned on.
C. Unplug all other external peripherals.
D. Remove the SD card from the camera.
Computers and Technology
2 answers:
aleksklad [387]2 years ago
4 0

b. make sure the camera is turned on apex

QveST [7]2 years ago
3 0
She needs to make sure the camera is on and working, if she doesn't than it wont tranfer
You might be interested in
In which of the following situations may you pass on the right
Natasha2012 [34]
In driving your vehicle, it is best to pass on the right after you slow your vehicle down and check for the road whether there is an upcoming vehicle or not. When the road is clear, it is best and safe to pass on the right after making sure that the coast is clear.
3 0
3 years ago
Read 2 more answers
17. Write a SELECT query for the palateE4 database that produces a result grid listing paintName, and a count of the occurrences
GaryK [48]

Answer:

SELECT paintname, COUNT(paintname) as count_paintname

FROM paint

GROUP BY paintname HAVING COUNT(paintname) > 2

ORDER BY paintname

Explanation:

The structured query language or SQL statement returns two columns of paintname and the count of the distinct paint names in the paint table with rows of grouped paint names greater than two and in the ascending order of the names.

4 0
3 years ago
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
Norma-Jean [14]

Answer:

The answer is "Public Key".

Explanation:

PKI stands for public key infrastructure. It is a collection of functions, protocols, equipment, code, and procedures that require to create, maintain, transmit, store and cancel encrypted certs and handle the authentication of a public key.  

  • It is used to sign documents digitally.
  • It works for propagating with Trojans and other malware.
5 0
3 years ago
Look at the pic. I know what girls be going through like us girls aren't toys. Please stop, please.
mixas84 [53]

Answer:

No need to be overly-sensitive, brainly deleted that question

If no one joins then its not a problem

6 0
2 years ago
Read 2 more answers
Other questions:
  • Is a software program that allows users to access the world wide web
    10·1 answer
  • A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
    10·1 answer
  • A file name extension provides what information about a file?
    10·2 answers
  • What are three steps to use to research relevant information on the internet? (Site 1)
    13·2 answers
  • Why is it important to minimize cable clutter in a rack?
    11·1 answer
  • Define a function below, sum_numeric_vals, which takes a single dictionary as a parameter. The dictionary has only strings for k
    12·1 answer
  • Name and describe the two (2) broad categories of files
    9·1 answer
  • What is a short sequence of characters that appears at the end of a filename and is preceded by a period called __________
    5·1 answer
  • Which support function under Tech Mahindra is governing data privacy and protection related requirements
    15·1 answer
  • How do people and computers approach problems differently
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!