1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
2 years ago
15

What does 32mb SVGA do

Computers and Technology
1 answer:
Nadya [2.5K]2 years ago
5 0

Answer:

hope it helps PLZ MARK ME BRAINLIEST,,!

Explanation:

They stabilize your grpahic image.

You might be interested in
In Python, while loops will repeat during the time the test condition is true.
frez [133]

Answer:

It is true

Explanation:

3 0
2 years ago
Read 2 more answers
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
How do u answer questions on brainly if ur on the app and on a phone. For me there is no answer button :(
Rudik [331]

Answer:

oh for me there is maybe try reloading?

Explanation:

8 0
2 years ago
When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
mart [117]

Answer:

a. make multiple fixes.

Explanation:

When we are troubleshooting firewalls we should not make multiple fixes after attempting a fix because it will not be beneficial for the security purpose.

We can repeat the failure after attempting the fix because we can fix it but a person with right mind won't be doing that.

We can test after each attempt that it is working properly.

We can also  reverse or undo the solution failures after making a fix.

5 0
3 years ago
The best technique to read​
Readme [11.4K]

Answer:

The best reading techniques are the SQ3R technique, skimming, scanning, active reading, detailed reading, and structure-proposition-evaluation.

Explanation:

6 0
3 years ago
Other questions:
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • Opinions are always based on facts. <br> a. True<br> b. False
    7·2 answers
  • What are some examples of lighter-than-air vehicles?
    10·1 answer
  • Badin Industries runs a web application that processes e-commerce orders and handles credit card transactions. As such, it is su
    9·2 answers
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • Using a caesar cypher with an offset of three characters (a -&gt; d, b -&gt;e, ...., z -&gt; c), what would be the correct cyphe
    6·1 answer
  • What is the limitation of computer<br>​
    5·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • write a function that given an integer n returns the smallest integer greater than n the sume of whose digits is twice as big th
    13·1 answer
  • What is control structure write it's types​ .
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!