1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
5

Help plz

Computers and Technology
1 answer:
Anarel [89]3 years ago
5 0

Answer: 1.) Collect the necessary ingredients and tools:

- jar of peanut butter

- jar of fruit jelly

- two slices of bread

- cutting board (larger that the combined surface areas of the slices of bread)

- butter knife

- tablespoon-sized spoon

2.) Place the cutting board on a stable surface, and the slices of bread side-by-side on the cutting board

3.) Open the jar of peanut butter.

4.) Using the spoon, scoop out 2 tablespoons of peanut butter and deposit in the center of one slice of bread [henceforth known as "Slice 1"].

5.) Using the knife, spread the peanut butter evenly across this side of Slice 1.

6.) Repeat steps 3-5, but with jelly instead of peanut butter and the slice of bread that is not Slice 1 [this second slice will henceforth be known to as "Slice 2"].

7.) Once Slice 1 and Slice 2 each have one side that is evenly coated with its respective spread (peanut butter or jelly), place Slice 2 on top of Slice 1 so that the spreads (peanut butter and jelly) are between the two slices and the externally-facing sides of each slice do not have spreads.

(ok so this is the best answer i can give u don't blame me if it's wrong)

You might be interested in
What do I do if my friend wants me to watch a video at my house?
steposvetlana [31]

Have him email the link to you and click on the it.

hope this helps, have a great day!

3 0
3 years ago
Read 2 more answers
What’s a sign you should talk to an adult about your online time
vesna_86 [32]

Answer:

If your are getting bullied or getting depressed about something in the internet, you should talk with a adult.

4 0
3 years ago
Read 2 more answers
There are a few simple rules that you can follow to store and manage files and folders in your computer. What is the most import
Nitella [24]
You should avoid deleting the unknown files to store your personal files and folders because if you delete that files it may be critical position with computer.
8 0
3 years ago
Read 2 more answers
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
What is NOT an issue associated with tag management systems? There is no automation available for tag management systems. Managi
SSSSS [86.1K]

Answer:

Managing tags means experience with the programming language to utilize them.

Explanation:

In different markets, tags are used to assigned prices and values to different products. To make these tags "tag management systems" are deployed to manage and create these tags.

Tag management system is software, that is used to create the tags with ease. There is no need of coding or programming while creating tags.

<em>So we can say that, There is no issue of Managing tags means experience with the programming language to utilize them.</em>

5 0
3 years ago
Other questions:
  • A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection w
    9·1 answer
  • Why is charles babbage known as father of computer?​
    10·1 answer
  • ________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an inf
    11·1 answer
  • What is copy and paste?
    13·2 answers
  • A ____ can be used to enter, display, or edit data
    5·1 answer
  • Edhesive 2.3 code practice question 1​
    11·1 answer
  • Are you absent minded because you are thinking of an online activity?​
    12·1 answer
  • Select the correct answer.
    5·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • What would be printed to the screen when the following program is run?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!