1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dominik [7]
3 years ago
9

How to take a pic with a cumputer

Computers and Technology
2 answers:
Vedmedyk [2.9K]3 years ago
5 0

Answer:

Use Snip+Sketch on your taskbar

It looks like this~

sattari [20]3 years ago
4 0

Answer:

Ctrl+Shift+4

Explanation:

You might be interested in
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Absolute time would be most similar to :
Luda [366]
The absolute time would be most similar to a fact. It was theorised and in fact, approved by scientists as a scientific law which governs, according to Wikipedia, as a "<span>true and mathematical </span>time<span>, of itself, and from its own nature flows equably without regard to anything external, and by another name is called duration: relative, apparent and common </span><span>time."</span>
3 0
4 years ago
Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
LUCKY_DIMON [66]

Answers:

-Social Engineering

-Dumpster Diving

-Keylogger

4 0
3 years ago
Once the term of copyright has expired,a work
rosijanka [135]
...??????????????????
8 0
3 years ago
Combination of at least six numbers ​
fomenos

Answer:

123456

Explanation:

i don't know what your trying to ask

7 0
3 years ago
Other questions:
  • What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
    14·1 answer
  • Five batch jobs. A through E, arrive at a computer center at almost the same time. They have estimated running times of 10, 6, 2
    14·1 answer
  • What is the purpose of filters in a database?
    11·1 answer
  • Online arguments that progressively escalate into insults and harsh language where the bully threatens and tries to intimidate a
    11·2 answers
  • The gradual wearing away or breaking down of rocks by abrasion is a type of __________________ weathering.
    8·1 answer
  • Select three functions of the cell membrane.
    15·2 answers
  • Tom is trapped on the top floor of a department store. It’s just before Christmas
    13·2 answers
  • Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
    15·1 answer
  • The ________ is the easy way to insert a new slide between existing slides.
    8·1 answer
  • Types of Hazards Mitigation Measures
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!