1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
14

Why does this app say im following a question? how do i make it stop?​

Computers and Technology
2 answers:
Artist 52 [7]3 years ago
7 0

Answer:

It is very simple

go back.

Komok [63]3 years ago
3 0

Answer:

I tried adding quora to home screen, but it asks to download app with annoying dialog box. I would be reading an interesting answer and it pops up. I can't close it, so I refresh page. But that makes the answer I was reading will go out and feed is filled with new answers. This is very annoying and I don't want to use quora anymore. If I'm using the browser instead of app, there are reasons for it. No one does anything without a reason. I prefer browser because I can easily bookmark an answer, open multiple questions , links or profiles in New tabs, because

You might be interested in
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
2 years ago
What is the different between the patch Tool and the Headling Brush tool?​
KonstantinChe [14]

Answer:

Explanation:

The Healing Brush and Patch tools add extra features. They match the texture, transparency, lighting, and shading of the sampled area. Instead of replacing them, pixel for pixel, like the clone stamp. This causes the painted pixels to blend seamlessly into the rest of the image. Using the Healing Brush tool: 1. Select the Healing Brush tool in the toolbox.

7 0
3 years ago
Can someone tell me what this means Higfaa
Arisa [49]

Answer:

it's a Jamaican slang

Explanation:

it depends on the wah it is used

7 0
3 years ago
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
Karo-lina-s [1.5K]

Answer:

Option 3 i.e., Z-Wave.

Explanation:

The Z-Wave device should be purchased by the company because It is a standard for connectivity, used mainly for smart home devices that use the 2.4 GHz RF band and this is also that device which the company wanted for the 50 meters away from the base station.  

So, It is a device should be purchased by the company.

Other options are incorrect because those devices not accomplish the following requirements.

7 0
3 years ago
Each time a user logs on locally, the ____ database is used to verify logon credentials. sam ssid sid nid
NNADVOKAT [17]
<span><span>Each time the user logs on locally, the SSID database is used to verify logon credentials.

Service Set Identifier (SSID), which is attached to the headers of packets that are transmitted over Wireless Local Area Network or W-LAN is a unique identifier. It contains a total of 32 characters. The alphanumeric identifier is case sensitive.</span></span>
6 0
3 years ago
Other questions:
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • Which of the following extends a network over a large geographic area by connecting local area networks together?
    14·2 answers
  • _____ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practic
    7·1 answer
  • Which of the following is NOT a factor to consider when examining extrinsic job satisfaction?
    7·1 answer
  • Which of the following is NOT an e-reader you would use as an alternative to carrying around a set of textbooks?
    13·1 answer
  • what are examples of conditional formatting tools? check all that apply. color scales, icon sets,data bars,cell styles,themes
    8·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • Help Me Please, Ill mark whoever has the best answer with brainliest.
    14·1 answer
  • List 10 ways how can graphic design help the community
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!