1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
2 years ago
14

Which tab would you click if you didn’t want to use the dialog box launcher in order to change a message’s delivery settings?

Computers and Technology
2 answers:
omeli [17]2 years ago
7 0

Answer:

The answer is B)

atroni [7]2 years ago
6 0
I think the answer is b

You might be interested in
“Urban Populations” should fall under which sections of your organizer?
ELEN [110]

Answer:

a = TOPIC

Explanation:

4 0
3 years ago
Read 2 more answers
Which type of device log contains the most beneficial security data?
zhuklara [117]
The security Log is your Answer.
6 0
3 years ago
An information system can enhance core competencies by
Nutka1998 [239]

Answer:

An information system can enhance core competencies by: encouraging the sharing of knowledge across business units.

Explanation:

Hope this helps you ! please mark me brainless

4 0
2 years ago
Create a class called Fraction. Provide a constructor that takes 2 integers. Provide methods for:
tekilochka [14]

Answer:

Explanation;

else

System.out.println("f1 and f2 are not equal");

switch (input.charAt(0)

{

case '+':

f3 = f1.add(f2);

System.out.println("f1+f2=" + f3);

break;

case '-':

f3 = f1.subtract(f2);

System.out.println("f1-f2=" + f3);

break;

case '*':

f3 = f1.multiply(f2);

System.out.println("f1*f2="+f3);

break;

case '/':

f3 = f1.divide(f2);

System.out.println("f1/f2="+f3);

break;

default:

System.out.println("Illegal command: " + input );

break;

}

}// end of while loop

} // end of main

}

 

Note ; this is the last part of the programme check the attachment from 1-5  this is the 6th .

8 0
2 years ago
Question A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of at
Morgarella [4.7K]

Answer:

TCP SYN flood

Explanation:

TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.

8 0
2 years ago
Other questions:
  • Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash
    15·1 answer
  • PLEASE HURRY
    6·1 answer
  • How do solar cells translate heat energy into mechanical energy
    13·1 answer
  • The feature present in most GUIs that helps organize multiple documents or files is _____.
    5·1 answer
  • You have been handed a mysterious piece of data by an unknown person. Judging by his shifty eyes and maniacal laughter you don't
    12·1 answer
  • What is not true of credit scores?
    11·1 answer
  • Is it safe to tape down cords such as internet cables to the floor?
    14·1 answer
  • Convert this hexadecimal number to binary :. A07F​
    14·1 answer
  • The address for the website you want to visit is called the browser internet URL World Wide Web
    5·2 answers
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!