1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
9

*PLEASE ANSWER QUICK*

Computers and Technology
2 answers:
dezoksy [38]3 years ago
8 0

Answer:

pretty sure its insert.

Explanation:

ivann1987 [24]3 years ago
6 0
A
Insert for your answer
You might be interested in
I used the Pearson correlation coefficient for my study to test the correlation and how strong is the relationship between two v
slamgirl [31]

Answer: NO

Explanation:

6 0
3 years ago
Read 2 more answers
Importance of availability of mobile devices content that is of interest for users.
Pepsi [2]

Answer:

 The importance of the availability of the mobile device content for the users is that during the less space in the mobile device, sometimes users want to see the useful information their mobile device so that is one of the interest of the users.

By providing the content result which the user searched for the particular information then, it is the good usuage of the device.

If we present the information or data in much precise and specific manner then, it is very helpful for the users and it also reduce the complexity in the system.

7 0
4 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
X = 10<br> y = 20<br> x &gt; y<br> print("if statement")<br> print("else statement")
Eduardwww [97]
I dont really understand what you want to do but im gonna answer it as if I understood it.

If x is 10 and y is 20 then y is larger than x
8 0
3 years ago
How do you open an application on the macOS?
timama [110]

Click the Launchpad icon in the Dock, or pinch closed with your thumb and three fingers on your trackpad. Then click an app to open it. You can also type an app's name to find the app in Launchpad, then press the Return key to open it.

3 0
3 years ago
Read 2 more answers
Other questions:
  • ASCII can be translated into over a million characters, making it a global code. True or false?
    7·2 answers
  • Într-o școală sunt n clase, fiecare având un număr diferit de elevi. Școală primește m pachete cu cărți, fiecare cu un număr dif
    15·1 answer
  • A phone call costs $0.58 plus $0.15 cents per minute. If the total charge for the call was $4.78, how many minutes was the call?
    15·1 answer
  • What are use class diagram, use case description and activity diagrams for use cases?
    7·1 answer
  • If a firm's pages are not near the top of query results, customers may never discover its website. This has led to _____ becomin
    12·1 answer
  • True false) cad means computer aided manufacturing​
    10·1 answer
  • Consider the markets for monitors, USB drives, central processing units, and Microsoft’s Windows. Assume monitor manufacturers u
    7·1 answer
  • my pc wants to run the highest graphics even though I restart it everyday and it gets around 10 fps and I have a 1080 Nvidia gra
    7·1 answer
  • You are tasked with designing an airplane that could carry a very large load of cargo. What type of airfoil would you use for th
    13·1 answer
  • The older computer had a CPU that ran at 266MHz compared to a current CPU that runs 3.7GHz. How many times faster is the new CPU
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!