1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
10

PLEASE ANSWER FAST!!!! look at the image below

Computers and Technology
2 answers:
Lubov Fominskaja [6]3 years ago
7 0

Answer:

mbnlkgjhituyhklcjvjhklhur

Explanation:

hjiuyotgjfhkjmrti

Lady bird [3.3K]3 years ago
5 0
A should be the answer
You might be interested in
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
Device management is the process of managing
faltersainse [42]
Device management is the process of managing the devices in your computer. In your computer you have the so-called device manager, in which all the drivers of your devices are installed. Device Manager allows you to monitor and manage each of its devices. You can also uninstall and update your devices in device manager. And the process of doing it is called device management. It is very simple to do this kind of stuffs as long you are familiar with your devices like mouse, printer, keyboard, etc.
8 0
3 years ago
Effective nonverbal communication can cause tension.<br><br> True or False
agasfer [191]

Explanation:

When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.

4 0
3 years ago
Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the trans
dimaraw [331]

Answer:

Security in communication between applications and sites in m-commerce can use SSL technology.

Explanation:

While developing an app, developers have to perform several checks and ensure that the server has a legitimate certificate.

7 0
2 years ago
Security is essential to keep in mind when doing business online. Select three tips for keeping customers' private
zlopas [31]
Make sure credit card processing uses a digital certificate to verify the processing site
5 0
3 years ago
Other questions:
  • Who<br> invented the term “debugging”?
    14·2 answers
  • A(n) ____ is a request for specific data from a database.
    9·1 answer
  • The sequence of folders to a file or folder is called a(n) ________
    8·1 answer
  • Let’s say you’re publishing a message with the Hootsuite Composer. The message contains a link to a landing page, and you want t
    9·1 answer
  • lance measured 0.485 liter of water. Angel measured 0.5 liter of water. lance said, "My beaker has more water than yours because
    6·2 answers
  • Cheri needs to write a small program that interacts with the user. What step will allow her to do this?
    14·2 answers
  • Who is the father of computer​
    12·2 answers
  • Which of the following statements best compares and contrasts the role of editors in a television news room and editors at a new
    5·1 answer
  • What are some best practices for file management
    8·1 answer
  • Clara works behind a computer all day. She gets a lot of headaches, and her eyes have been hurting her lately. Her doctor diagno
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!