1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
6

Evaluate each condition as to whether it is true or not.

Computers and Technology
1 answer:
ivann1987 [24]3 years ago
7 0

Answer:

For the first one you have not met those requirements because you are still 16, for the second one you have met those requirements because you can either have a score over 30 (which you have 34) or be a valedictorian

Explanation:

Above

You might be interested in
Choose two browsers and compare their security features.
777dan777 [17]

Answer:

Brave & Mozilla Firefox

Explanation:

1. Brave

Brave browser is well known by its security, privacy, and speed. Just with a click you can turn security settings up high. Brave uses Chromium, Google’s open-source browser, which integrates strong sandboxing techniques. it also features automatic HTTPS upgrading and turns off plugins by default.

Brave primarily focus on privacy of it's users by auto blocking ads and tracking cookies that might stand as threat to the privacy of the users. Whereas most popular browsers allow you to install ad-blocker browser as an extensions. Another best part of Brave is that it also allows users to open private browsing tabs using Tor for maximum protection.

2. Mozilla

Mozilla browser is a an open-source, community-based development can achieve. Like many browsers, Firefox displays a padlock icon to let you know whether your connection is secure. However, Firefox’s padlock icon is surprisingly subtle. It’s easy to miss that your connection is unsecured.

This aside, Mozilla provides regular updates to Firefox, ensuring that any security flaws get patched quickly. If you’re seeking a private and secure browsing experience, combined with a quick and user-friendly interface, you should still consider Firefox.

4 0
3 years ago
URGENT HELPP<br> WILL MARK BRAINLIST
Semenov [28]

Answer:

1. (1) Travel guide, (2) Study notes for students , (3) Some creative ideas that I want to share with others

2. (1) he or she would have some work related to the website I have created, (2) he or she would be interested in knowing about something which would be available in my created website

3. I want to learn how to add photos in the html pages

3 0
3 years ago
Which of the following is an example of phishing attack? csp
TEA [102]
There are no examples you imbecile it’s A
4 0
3 years ago
Only Lysita knows the password for the question......
emmasim [6.3K]
The correct answer is 1234.

7 0
3 years ago
To hide the ribbon, ______ on any one of the tabs of the ribbon.
Natasha_Volkova [10]
The ribbon is a set of toolbars at the top of the window in Office programs designed to help you quickly find the commands that you need to complete a task. Sometimes the ribbon can get hidden and it's hard to find. The quickest way to show the ribbon is to click on any visible tab, like Home<span>, </span>Insert<span> or </span>Design<span>. You might also want to hide the ribbon to maximize screen space.</span>
8 0
3 years ago
Other questions:
  • How will a packet tracer environment be affected if a heater is added to a container named branch office and turned on?
    5·1 answer
  • A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.
    13·1 answer
  • 10 facts about turbines
    11·2 answers
  • Gina's teacher has sent her a Word document that contains the names of all the students who are participating in the
    11·2 answers
  • A troubleshooter's ability to design and test hypotheses in order to solve a technology problem is based on ____.
    14·1 answer
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    6·2 answers
  • Here is a list of storage devices:
    5·1 answer
  • Assert statements are a tool programmers employ to help them debug their code more efficiently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!