1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
12

Dadadadaddaaffafafasgag

Computers and Technology
1 answer:
skad [1K]3 years ago
7 0
Thanks for the points lol have a good day or night
You might be interested in
In order to place a gradient within a stroked path for type, one must convert the type using the __________
Black_prince [1.1K]

Answer:

in order to place a gradient within a stroked path for type ,one must convert the type 17316731

7 0
3 years ago
What is the speed limit in school zone
Mkey [24]
School zones typically have speed limits between 15 and 25 mph (25 and 40 km/h).
8 0
4 years ago
Read 2 more answers
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
sp2606 [1]

Change default user name and password is the first step that should be performed by Derek to secure the wireless router

<h3><u>Explanation:</u></h3>

The device that helps in accessing internet or to any private computer network is the wireless router. It is a devices that acts as the access point which is wireless in nature. There are many steps involved in securing  the wireless router. If the wireless router is not secured then it will be used by others without our knowledge.

In order to secure the wireless router firstly we should create our won password and username deleting the default username and password.To do this, we must open router setting page and change the default username and password with our own. The SSID name of the network must also be changed.

6 0
4 years ago
When workers use techology to work from home or an office center, they are
dem82 [27]

Answer:

Electronically

Explanation:

Hope this helps

8 0
3 years ago
Read 2 more answers
Naynar kis dhrm se sambandhit hai​
Inessa05 [86]

Answer:

Islam dharm se sabandhit

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which socket type is soldered to the motherboard, along with the cpu?
    6·1 answer
  • What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manu
    9·1 answer
  • Analog footage can be digitized using video _____ equipment.â
    7·1 answer
  • Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then prel
    8·1 answer
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • RrayList Mystery Consider the following method:
    9·1 answer
  • Role of computers in everyday life​
    15·1 answer
  • Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto
    15·1 answer
  • How do u reverse image search on Android? ​
    9·1 answer
  • Clasifica los documentos comerciales en activo, pasivo o patrimonial para cada operacion:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!