1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
3 years ago
6

My iphone will not charge at all. what do i do!!!!!!

Computers and Technology
2 answers:
olga2289 [7]3 years ago
8 0

Answer:

u need a battery replacement

Explanation:

that's y

Juliette [100K]3 years ago
4 0

Answer:

It might be the charger and you might need to get a new one. I'm not exactly sure. Hope you found out!!

Explanation:

You might be interested in
What is the first thing you should do when you discover a computer is infected with malware? The second thing?
Goshia [24]

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

3 0
3 years ago
When researching Information about technology for use in a project, it is NOT important to consider the date that the informatio
REY [17]

Answer:

B. False

Explanation:

Hope this helps!

4 0
2 years ago
Which is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance?
Dafna1 [17]

Answer:

Remote access VPN

Explanation:

The solution that represents the majority of VPN's on the markets and is commonly referred to as a VPN appliance is the Remote access VPN

A remote access VPN is a type of VPN  that  works by creating a virtual channel (appliance ) between different devices for the purpose of exchanging data in an encrypted form. although this Tunnel passes through the public internet the Data exchanged are only accessible by the devices connected via the tunnel only .

The remote access VPN  is mostly used to connect an employee to the company's network therefore it represent the majority of VPNs in the market.

3 0
3 years ago
Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
hjlf

Answer:

To avoid receiving malware-infected files like spam.

Explanation:

Hackers use malware to gain unauthorized access to company files and information for personal gain. Files infected by the malware can infect other systems or files. There are various types of malware namely; virus, trojan horse, worm, spyware, ransomware, adware etc.

5 0
3 years ago
One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without ____
Simora [160]

Answer:

One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without employing full-time IT professionals.

Explanation:

7 0
2 years ago
Other questions:
  • What is online school like 3 sentences
    8·2 answers
  • For the past three years, the interviews conducted at Gavallet, an e-commerce site, have been following the same pattern. Candid
    9·1 answer
  • To create a pull quote, how should a user format the text?
    6·2 answers
  • Which of these is an expansion slot type?
    5·1 answer
  • A finally clause will execute:
    8·1 answer
  • In two to three sentences, describe one advanced search strategy and how it is useful.
    13·1 answer
  • Cómo se hacían antes las cosas que hoy en día se hacen apoyadas en aplicaciones y software?
    10·1 answer
  • Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
    11·1 answer
  • Digital communication and production chapter 17
    6·1 answer
  • Which website citation is correctly formatted according to MLA standards?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!