1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
13

Final points give away

Computers and Technology
2 answers:
sertanlavr [38]3 years ago
6 0

Answer:

sounds good

Explanation:

solmaris [256]3 years ago
3 0

yea I guess go subscribe tk his channel

You might be interested in
How do you select from the insertion point to the beginning of the current line?
Neko [114]

Answer:

Press the Shift key, then press the Home key.

Explanation:

This is because Home key take you to a beginning of a line and shift selects.

Have a nice day!

Please mark as brainiest if this helped you! :)

4 0
3 years ago
List 2 positive impacts of cybersecurity.
kupik [55]

Answer:

Protection for your business and Increased productivity

Explanation:

This is because it ensures your employees aren't at risk from potential threats and, since there no virus, the computers will work well (not slow down)

7 0
3 years ago
Read 2 more answers
How barcodes can be used in a library. Consider the type of files needed and how the system can track where books are in the lib
Likurg_2 [28]

Answer:

MORE INFO PLZ

Explanation:

6 0
3 years ago
Your friend sends you a photograph of his son. you want to enlarge the photograph. which program type will you use to make this
konstantin123 [22]
Reshade Image Enlarger
3 0
3 years ago
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
Other questions:
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • What is virtual memory?
    11·1 answer
  • Which of the following is an upper body workout
    6·2 answers
  • Name three output devices
    6·1 answer
  • Rafael needs to add a title row to a table that he has inserted in Word. What should he do? Use the alignment options. Use the M
    14·2 answers
  • Assume hosts A and B are each connected to a switch Svia 100-Mbps links. The propagation delay on each link is 25μs. The switch
    15·1 answer
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • What is the last phase of the website development process?
    10·2 answers
  • n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each
    11·1 answer
  • A(n) _________ produces dynamic reports, supports alerts/rss functionality, and supports user subscriptions.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!