1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
3 years ago
13

Christopher was looking at the TV while getting feedback on his opinion essay. What should he do differently? Don't get feedback

from a trusted adult. Finish watching his TV show. Make sure the trusted adult likes the show on TV, too. Turn off the TV and face the person who is speaking.
Computers and Technology
1 answer:
taurus [48]3 years ago
8 0

Answer:

Turn off the TV and face the person who is speaking.

You might be interested in
Which group scope can be used to assign permissions to resources only in the domain in which the group is created
sleet_krkn [62]

Answer: Domain local group

Explanation:

Domain Local Group is a form of group in a Windows Server network in Microsoft which is used by an administrator to assign permissions to the resources that are in same domain.

Their scope is strictly restricted to their particular domain. It should also be noted that they've open membership which simply implies that members form other domain can be added to them. One has to first know the users that have identical job responsibilities in order to use the domain local group, then identify the network resources that are similar which users want to access.

8 0
3 years ago
A broadband router is used to do which of the following? run the programs on a computer locate lost files on a computer manage a
Zina [86]
The router's main job is to manage a computer's connection to an internet provider
6 0
3 years ago
Please select the word from the list that best fits the definition<br><br> Plagiarism
Pachacha [2.7K]
The practice of taking someone else's work or ideas and passing them off as one's own.
5 0
2 years ago
Read 2 more answers
This might sound crazy! But please help.
aliya0001 [1]

Answer:

You Probably should’nt do that

Explanation:

8 0
2 years ago
Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
Evgesh-ka [11]

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

5 0
3 years ago
Other questions:
  • At the dsl local carrier's office, the __________ demultiplexes the data streams and converts them into digital data.
    10·1 answer
  • You can access decorative underlines and change their color through the ____ drop-down.
    8·1 answer
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • Escribe, en los siguientes cuadros, los conceptos que correspondan
    10·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • How to code on python
    8·2 answers
  • . It has been said that technology will be the end of management. Maybe. How about artificial intelligence
    9·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • The lower band and upper band of integer data type​
    6·1 answer
  • What Is the device used to produce hard copies from personal computer ​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!