1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
2 years ago
8

200 points and brianlist if. done correctly... When working in Scratch, after clicking on the Choose Backdropicon and making you

r selections, where will your choices show up?
Group of answer choices

on the left side of the Backdropsscreen

on the right side of the Backdropsscreen

at the bottom of your screen

in a pop-up bubble in the center of the screen
Computers and Technology
1 answer:
9966 [12]2 years ago
7 0

Answer:

huh

Explanation:what is the question

You might be interested in
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
3 years ago
Read 2 more answers
What is a custom information field that helps users to find a specific document?
gtnhenbr [62]
Go to start then type the name of the document or file
6 0
3 years ago
A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
serious [3.7K]

A Network Intrusion Detection System watches for potentially malicious traffic and triggers Alert when it detects an attack.

<h3>What is Network Intrusion Detection System?</h3>

Network Intrusion Detection System can be regarded as the security system that helps in detection of potentially malicious traffic and gives notification.

Therefore, Network Intrusion Detection System helps to triggers Alert when it detects an attack.

Learn more about Network Intrusion Detection System at:

brainly.com/question/8118353

6 0
2 years ago
Which sensitivity level is not a default available in Outlook 2016?
vichka [17]

Answer:

Company only

Explanation: The sensitivity levels available for Outlook 2016 are Normal, personal,private and confidential, this sensitivity levels helps users to the intentions of the user of the product and it will help to give their plan on what and how to utilize the product. It is very important to make use of the sensitivity levels in your Outlook for better usage of the Microsoft Outlook.

6 0
2 years ago
Read 2 more answers
What are computer virus ? Explain in detail.In your answer include symptoms and prevention (3each)
Elenna [48]

Answer:

Explanation:

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

Like other types of malware, a virus is deployed by attackers to damage or take control of a computer. Its name comes from the method by which it infects its targets. A biological virus like HIV or the flu cannot reproduce on its own; it needs to hijack a cell to do that work for it, wreaking havoc on the infected organism in the process. Similarly, a computer virus isn't itself a standalone program. It's a code snippet that inserts itself into some other application. When that application runs, it executes the virus code, with results that range from the irritating to the disastrous.

Computer virus symptoms

How can you tell if a virus has slipped past your defenses? With some exceptions, like ransomware, viruses are not keen to alert you that they've compromised your computer. Just as a biological virus wants to keep its host alive so it can continue to use it as a vehicle to reproduce and spread, so too does a computer virus attempt to do its damage in the background while your computer still limps along. But there are ways to tell that you've been infected. Norton has a good list; symptoms include:

Unusually slow performance

Frequent crashes

Unknown or unfamiliar programs that start up when you turn on your computer

Mass emails being sent from your email account

Changes to your homepage or passwords

7 0
2 years ago
Other questions:
  • Remember that the function "main" takes optional parameters, these being common:
    10·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the
    8·1 answer
  • What is a VIN and what role does it play during a criminal investigation? Explain how a VIN could help in a bomb and/or arson ca
    12·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • Which of these components is a part of the Central Processing Unit (CPU) of a computer?
    11·2 answers
  • A large amount of scatter in a scatterplot is a indication that the association between the two variables is
    13·2 answers
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • Responsible use of computer is known as ................. .​
    11·1 answer
  • You can't cite Wikipedia, what are three ways that you can use it for your research?
    5·1 answer
  • How has 5G become more energy efficient?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!