1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
5

Please Help Me!!!!!!!!!!!!!

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
3 0

Explanation:

a magazine cause it helps put out commercial

You might be interested in
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
A user has requested a field that counts the number of child record associated with a custom object. These custom objects have a
wel

<em>The answer is D. </em>

<em> </em>

<em>It can be presented using Visual Flow such as ER Diagram to show relationships of child record and the object. ER Diagram or Entity Relationship Diagram are graphical charts that is showing how entities such as child, parents and other objects/ persons and how they could be related from one another. Relationships can be one to one, one to many, many to one and many to many.</em>

3 0
3 years ago
Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to con
ch4aika [34]

Answer:

The search bars in search engines to find the most reliable information.  

Explanation:

8 0
3 years ago
U GET BRAINLIEST HELP PLZ
Art [367]
BOTH OF THEM ARE C : )
3 0
3 years ago
What in Microsoft word brings up mini toolbar
Ray Of Light [21]
You right click the mouse. hope this helps 
6 0
4 years ago
Other questions:
  • Write the printitem() method for the base class. sample output for below program: last name: smith first and last name: bill jon
    6·2 answers
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • What are the four requirements of a linear programming​ problem?
    8·1 answer
  • What is internal storage device
    14·1 answer
  • The entress Effie cooks as a chef never vary by taste, quantity or quality
    6·1 answer
  • What is software and explain the five types of software
    5·2 answers
  • A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a lat
    9·2 answers
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • G i r l s o n l y j o i n <br> id= ons jcuv jke
    13·2 answers
  • All variables are----------------------------------------------- help please
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!