1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lubov Fominskaja [6]
3 years ago
12

Helpppppppppppppppppppp

Computers and Technology
1 answer:
irga5000 [103]3 years ago
7 0
THE ANSWER IS B MOST DEFINITELY
You might be interested in
Mason has created a website for his presentation so that people can access relevant resources during or after the presentation.
skelet666 [1.2K]

Answer:

Option E is the correct option.

Explanation:

When any user has created any websites for presenting his presentation by which users can access appropriate tools at the time of the presentation or afterward.  

So, in the presentation process, the following user integrated social media because he wanted that the other users can access the relevant tools for the presentation.

6 0
3 years ago
What is a Windows feature that allows you to temporarily store text?
nata0808 [166]
This would be copy and paste.

When you select a text, you can use your keys CTRL and C to copy that same selected text. After this, you can use the paste feature by selecting CTRL and V. Doing this, your selected text will be copied and pasted to a certain location. 
3 0
3 years ago
Where do animators work?
mrs_skeptik [129]
1. Most animators work in big cities where movie and television studios, animation studios, software developers, and video game design firms are located.
2. I’m confused about this one.
3. An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. ... The dominant general-purpose desktop operating system is Microsoft Windows with a market share of around 76.45%.
4. A database is an organized collection of data, generally stored and accessed electronically from a computer system.
5. An app, which is short for "application," is a type of software that can be installed and run on a computer, tablet, smartphone or other electronic devices. An app most frequently refers to a mobile application or a piece of software that is installed and used on a computer.
5 0
3 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
The coding system that has just two characters is called:
cupoosta [38]

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

6 0
3 years ago
Read 2 more answers
Other questions:
  • The LPN/LVN cares for an older client admitted to the hospital for treatment of a fractured femur. The LPN/LVN notes the client
    10·2 answers
  • How do you join The Meeting on zoom because I have class Tomorrow with My Teacher
    7·2 answers
  • Discuss briefly four types of websites and the criteria you will use to evaluate the content of a website
    8·1 answer
  • Hubs connect network hosts in which configuration?
    7·1 answer
  • Hey guys i need help again on coding
    7·1 answer
  • In your own words discuss 4 major strength and weakness<br> of<br> computer
    13·1 answer
  • How do cybercriminals use JavaScript maliciously?
    11·1 answer
  • Apply Decision Tree Algorithm on the following data:
    12·1 answer
  • LAB: Praising dates
    14·1 answer
  • Importance of software in computer​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!