1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
13

░▒▓█►─═ ℍᵒ ═─◄█▓▒░ (っ◔◡◔)っ ♥ how are you doing ♥

Computers and Technology
1 answer:
Lera25 [3.4K]3 years ago
8 0
I’m not doing too hot
Stressing over school and I doesn’t help that I don’t understand somethings
You might be interested in
Abby wants to simply share a snapshot of her calendar with another user. Which option should she choose to achieve
lara [203]

Answer:

Screenshot

Explanation:

If what Abby wants is a simple snapshot then her best option would be to take a Screenshot of her calendar. A Screenshot is basically a snapshot/photo of the exact screen that is displayed to you on your personal computer. This is done by pressing the windows key and prtsc key on the keyboard at the same time. The screen will go dark-grey for a second and a snapshot of your screen will be saved in the Windows Pictures folder. She can then grab this picture and send it to whoever she wants.

4 0
3 years ago
USDA-APHIS Animal Care Resource Policy #12 "Considerations of Alternatives to Painful/Distressful Procedures" states that when a
katrin2010 [14]

Answer:

C. The specific field of study

C. change in anesthetic agent

Explanation:

In the consideration for the procedure, some information are required and examples are the strategy of the search/the database name. However, the area of study is not one of the information.

The animal use proposal can general be altered based on the type of change required. However, an anesthetic agent alteration is not a significant change.

6 0
3 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
Which of the following can be sources of sediment? A. fragments of other rocks B. chemicals and minerals dissolved in water C. s
RUDIKE [14]
D. All of the Above
Which of the following can be sources of sediment?

7 0
4 years ago
___________ is an unsecured client server application / protocol that transfers files between two computers.
Alexus [3.1K]
It is known as the File Transfer Protocol or FTP. It is based on a customer server demonstrate design and uses isolate control and information associations between the customer and the server. FTP clients may conform themselves with an unmistakable content sign-in convention, regularly as a username and secret word, yet can interface namelessly if the server is designed to permit it.
6 0
4 years ago
Other questions:
  • In windows vista, which process allows you to display two documents side by side?
    12·2 answers
  • A folder window shows you he contents of the folder
    8·1 answer
  • You knew that you had to take this quiz so you logged into Blackboard and went to the quizzes section. In this scenario your com
    11·1 answer
  • Assume that a picture is represented on a monitor screen by a rectangular array containing 2048 columns and 1536 rows of pixels.
    12·1 answer
  • In an IPv.4 addressing scheme the router works at layer 3 on which addressing layer?
    14·1 answer
  • true or false? spreadsheets provide more options for graphical representation of the data than databases​
    6·1 answer
  • At a minimum, your vehicle insurance policy must provide coverage of
    10·1 answer
  • D Question 9 What is output by the following?
    5·1 answer
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • Match each item with a statement below.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!