1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
3 years ago
9

My speaker on my phone is not working, when I try and play music and videos the sound dosen't work. However my alarm works. Can

someone help me?
Computers and Technology
2 answers:
Leni [432]3 years ago
8 0

Answer:

Try factory resetting

SVEN [57.7K]3 years ago
7 0
Try turning off your phone or resetting it
You might be interested in
When using the red / yellow I green method to present status of a project, green can mean which of the following?
Temka [501]

Answer:

D. All of these

Explanation:

I hope this helps you! Have a great day!

bren~

3 0
2 years ago
Read 2 more answers
If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be
Sergio [31]

If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be flawed.

<h3>What are algorithms being used for?</h3>

Algorithms are known to be tools that are made to help in calculation, data processing, and a kind of automated reasoning.

Hence, If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be flawed.

Learn more about algorithm from

brainly.com/question/23282908

#SPJ1

6 0
2 years ago
Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co
zheka24 [161]

The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

<h3>What does MyDoom virus do?</h3>

The MyDoom virus was said to be the one that brought about a lot of loss in the whole globe.

The  MyDoom is known to be an effective worm that was created to make zombies out of lots of thousands of computers.

Note that the Hackers are able hijacked terminal to wage a kind of  denial of service (DoS) attack to any firm that they do identified.

The virus is known also as Novarg as it is a“worm,” sthat do pread by mass emailing.

Therefore, The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

Learn more about Virus from

brainly.com/question/14887682

#SPJ1

6 0
2 years ago
What is the most consistent item regardless of the software used in BI?
vodomira [7]

Answer Explanation:

Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.

THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :

  • data analyst has the most responsibility of BI he is the most important part of BI
  • It is the interconnected process of inspection changing and modeling
  • data analysis is hugely aided by data mining
5 0
3 years ago
What is the definition of phishing with an example
Diano4ka-milaya [45]
Phishing is an ability of fraudulently obtaining personal info.
synonyms: Fraud and scam
8 0
3 years ago
Other questions:
  • One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
    5·1 answer
  • Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
    11·1 answer
  • What is a Software Quality Assurance Audit?
    12·1 answer
  • Which keyboard feature is a form feed character?
    15·1 answer
  • What does the cpu do (in terms of register contents and stack) when it executes a jsr instruction?
    12·1 answer
  • In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having i
    11·1 answer
  • A ________ is a powerful analytical tool to size up Apple Inc.'s competitive assets in order to determine whether or not those a
    9·1 answer
  • Consider the following class declaration.
    6·1 answer
  • The web lab consists of which elements. Select all that apply. Group of answer choices Files Inspector Tool Preview Hints Work S
    9·1 answer
  • how is a two-dimensional array different from a traditional one dimensional array? From an ArrayList?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!