1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
14

does anyone knows how I can remove those people at the bottom In google photos it’s not showing up in google contact help

Computers and Technology
1 answer:
Mashcka [7]3 years ago
3 0
Maybe refresh all your Safari apps
You might be interested in
Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better. What is the
Mnenie [13.5K]

Answer:

use of keyboard shortcut sizing handles

7 0
3 years ago
It is desirable to provide a degree of __________ __________ among classes so that one class is not adversely affected by anothe
alexandr402 [8]

Answer:

The right approach is "Traffic isolation ".

Explanation:

  • A significant amount of those same traffic insulation is necessary. Therefore one class isn't influenced by yet another traffic class which makes a mistake. Then maybe the packages throughout the traffic could collapse.
  • This also eliminates uncertainty with people operating the infrastructure. If you don't need the VLANs to speak to one another because you could implement anything about this illustration as well as add it to certain VLANs.
4 0
3 years ago
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
The data model shows the_______structrue of database.​
Kay [80]

The data model shows the <u>rows and columns</u> structrue of database.

6 0
3 years ago
You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
Flauer [41]

Answer:

Nothing will happen.

Explanation:

The rules written between /* and */ will be ignored because /* and */ are the standard way of writing comment in a style sheet code. So, whatever fall in between them will be ignored during rendering of the page.

7 0
4 years ago
Other questions:
  • Can I recover my data from HDD if I just started formatting but did not finish it? (I ceased it!)
    7·1 answer
  • Can you plug a usb 2.0 into a 3.0 port on your computer
    12·1 answer
  • What does an operating system do?
    11·2 answers
  • Who played a leading role in perfecting movable type for printing?
    15·1 answer
  • You are considering creating a mobile app. Describe a basic statement for the app you would create and whether your app should b
    7·1 answer
  • Create detailed pseudocode for a program that calculates how many days are left until Christmas, when given as an input how many
    15·1 answer
  • Complete the function to return the factorial of the parameter using recursion,
    10·2 answers
  • Match each statement from the passage with the message it represents.
    10·1 answer
  • Create a new Java class called AverageWeight. Create two arrays: an array to hold 3 different names and an array to hold their w
    13·1 answer
  • A computer reads a sequence from top to bottom and left to right.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!