1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
2 years ago
5

What educational site could I make a screen capture tutorial on? I need ideas for a school project.

Computers and Technology
1 answer:
snow_tiger [21]2 years ago
4 0

You Need Software To Screen Capture

The Software You can use is OBS its free and there are watermarks

You might be interested in
Which of the following is not a key way that a LAN shares
Lynna [10]

Answer:

I believe it's collaborative software

Explanation:

5 0
3 years ago
what impact of information communication technology have on the environment about electronic waste, use of electricity?​
hram777 [196]

Answer:

When e-waste is exposed to the heat, toxic chemicals are released into the air damaging the atmosphere.

Explanation:

6 0
2 years ago
The options on the Ribbon will____:
IceJOKER [234]

replace both the traditional menu bar and toolbars.

Hopefully, It's Correct... (ノ◕ヮ◕)ノ

7 0
3 years ago
DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
OLEGan [10]

DES is a commonly used symmetric encryption

A) is a commonly used symmetric encryption

<u>Explanation:</u>

DES stands for Data Encryption Standard. It is a symmetric key algorithm and is used for encrypting electronic data. It was developed in 1975. DES is one of the oldest encryption standards to be used in the industry.

The algorithm takes 16 rounds of permutations in order to encrypt data. But now, with the advent of technology, as new algorithms have been designed and put in use, DES is less preferable.

In the process of key generation, some keys generated sometimes turn out to be weak and hence are prone to attacks. If not for the weak keys generation, DES works perfectly fine and is an effective algorithm to encrypt data.

6 0
3 years ago
Is it true that if the user log out the computer will turn off automatically​
sergiy2304 [10]
Yes that is a true statement
8 0
2 years ago
Read 2 more answers
Other questions:
  • Which loan type requires you to make loan payments while you’re attending school?
    10·1 answer
  • Which of these is a social consequence of effective communication
    12·1 answer
  • Which option best describes the cheapest way to file your federal income taxes?
    5·1 answer
  • What uses HTML hypertext links that users can click to access different locations or information?
    11·1 answer
  • Lamp is an acronym for a complete solution of open source software that goes together to build a general purpose web server. whi
    13·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • Is an electronics standard that allows different kinds of electronic instruments to
    12·1 answer
  • A good sentence about art
    9·1 answer
  • Write a list comprehension statement to generate a list of all pairs of odd posi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!