1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
3 years ago
10

Any Body have a zoom class goin on i wanna bomb

Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
6 0

This site is only for education related questions. You should only answer or ask questions. That's what we are here for. Whoever is reading this answer, please spread it to stop people from zooming, hurting others, or just posting non-related to education questions. Thank you.

You might be interested in
Write a structured algorithm that prompts the
MA_775_DIABLO [31]

Answer:

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

Explanation:

Algorithm is a sequence of instructions a computer is expected to follow to solve a particular problem.

Required :

Two inputs ; num1 and num2

Expected output

Algorithm :

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

The two numbers to multiply are entered ; the product is calculated by the program ; the the user inputs his or her own expecteted product ;

Both are compared and the output of the comparison is displayed (either correct oe incorrect)

8 0
3 years ago
A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments
Aloiza [94]

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

4 0
3 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
How to reset windows 7 password without logging in
hammer [34]

Explanation:

<em>.</em><em>Reboot your laptop or PC. </em>

<em>Select the Repair your Computer option and press Enter. </em>

<em>The System Recovery Options window will popup, click System Restore, it will check the data in your Restore Partition and factory reset laptop without password.</em>

4 0
3 years ago
Read 2 more answers
If i paid $37.20 for 12 gallons of ice cream how many would 1 quart of ice cream cost
Lapatulllka [165]

Answer:

$0.78

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • The Apple II is an IBM-compatible PC "clone.
    8·1 answer
  • Under what key category do page up and page down keys fall?
    15·1 answer
  • Which of the following experiences is considered a simulation?
    12·1 answer
  • im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
    6·1 answer
  • UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01100110, 0111010
    13·1 answer
  • Write a script that will read from a file x and y data points in thefollowing format:
    9·1 answer
  • What is the mest gun in pixel gun 3d imma give you brainliest
    14·2 answers
  • Does trend in computing important for organization management?​
    8·1 answer
  • Busco....................... Novio
    8·2 answers
  • To edit the color of the text in Word Online, choose the Font color command under what tab?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!