1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
3 years ago
9

My speaker on my phone is not working, when I try and play music and videos the sound dosen't work. However my alarm works. Can

someone help me?
Computers and Technology
2 answers:
Leni [432]3 years ago
8 0

Answer:

Try factory resetting

SVEN [57.7K]3 years ago
7 0
Try turning off your phone or resetting it
You might be interested in
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Which of the following activities can cause data to be damaged or lost?
jekas [21]
Illegal access to a system
3 0
3 years ago
Picture related to cyber safety
Fantom [35]

Answer:

?????

Explanation:

4 0
2 years ago
Read 2 more answers
In today's digital marketplace, the line between retailer and distributor has become less distinct.
jenyasd209 [6]

Answer:

The answer you're looking for is True - The line between retailer and distributor has become less distinct.

Explanation:

5 0
3 years ago
What are the factors that influence the selection of access control software and/ or hardware? Discuss all aspects of access con
skelet666 [1.2K]

Answer:

While selecting the access control system (software or hardware), there are many factors that influence it and those factors are campus location, network capabilities, number of users using it, size of campus, the motive for using it, etc.

Explanation:

The access control system is electronic device that needs to be connected to the network for providing security control and authorization to the user to enter into the Campus.  

Access control systems are used to control access into premises or any IT area which is control in two ways either in a physical way or a logical way.

8 0
3 years ago
Other questions:
  • PLS HELP ASAP! WILL GIVE BRAINLIEST!
    14·1 answer
  • Ben's team is working on an English project. The members want to see everyone's progress on their part of the project. What tech
    7·2 answers
  • How to make logo black and white in paint?
    14·1 answer
  • To save and store data separate from a computer, it helps to have an
    15·2 answers
  • When performing a basic search with Bing, you first type in your search expression and then click a button to begin the search;
    13·1 answer
  • (fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
    13·1 answer
  • What is the status of this account?
    13·2 answers
  • DUE SOON NEED HELP FAST!!
    11·1 answer
  • When using the red / yellow I green method to present status of a project, green can mean which of the following?
    15·2 answers
  • In the NumPy function, the data preparation technique that is used to help machine learning algorithms is called _________.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!