1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
3 years ago
5

PLEASE HELP I mainly only need the answer for 4.

Computers and Technology
1 answer:
Ede4ka [16]3 years ago
6 0

Answer:

it is asking for https response

You might be interested in
Disconnecting or making the equipment safe involves the removal of all energy sources and is known as _____________. A) Isolatio
Ray Of Light [21]

Isolation. Also is known as Lockout-Tagout. I hope this helps.

5 0
3 years ago
Read 2 more answers
Which of these is a valid use of the Reply All feature?
zalisa [80]

Answer:

I think is None of this ,

6 0
3 years ago
A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the wa
g100num [7]
That would be a virus.
8 0
4 years ago
The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
d1i1m1o1n [39]

Answer:

The technique used by the photographer which would be considered unethical today is:

Stage Managing

Explanation:

  • The Migrant Mother is a famous that was captured by the photographer named Dorothea Lange. This photograph was taken during the era of great depression that shows the misery of a women as well as her courage.
  • The photographer used the stage managing technique because the women in the photograph purposefully posed for the picture in order to let others know about their plight. She wanted to develop awareness as well as wanted the Government to help farmers.
  • The name of the women in the picture is Florence Owens Thompson and she was a mother of seven children. She lived in California.

8 0
3 years ago
Read 2 more answers
You work for the Contoso Corporation. You have a server that acts as a file server for clients. You must make sure that the serv
Anika [276]
Get a dedicated server with 6-10gb RAM, which might be able to run a lot, while staying up with no lag.
6 0
3 years ago
Other questions:
  • What is Least effective at preventing a computer virus
    10·1 answer
  • Which is an example of a screenshot?
    7·2 answers
  • The prediction that the number of transistors on a chip would double about every two years is known as ________. Metcalfe's law
    6·1 answer
  • which telecommunications service allows internet and telephone service to work over the same phone line
    13·1 answer
  • Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
    13·1 answer
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value
    13·1 answer
  • What is pollution?
    14·2 answers
  • How to do or create a shepard tone using additive synthesis in Pure Data. Please help, desperate!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!