1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
10

I need help with this question. its in the photo

Computers and Technology
1 answer:
Stella [2.4K]3 years ago
4 0

Answer:

Its allows you to see the button, think so.

You might be interested in
Olivia wants to change some settings in Outlook. What are the steps she will use to get to that function? open Outlook → File →
Rainbow [258]

Answer:

C.

Explanation:

edg 2020

3 0
2 years ago
Read 2 more answers
2) List three (3) negative impact of Technology on society
Nataly [62]

Answer:

1. social media and mobile devices may lead to psychological.

2. They may contribute to more serious health conditions such as depression.

3. The overuse of technology may have a more significant impact on developing children and teenagers.

Explanation:

may this help you have a good day

5 0
3 years ago
A destination port number at the transport layer identifies which application on a computer should receive the data transmission
Lady_Fox [76]

A destination port number at the transport layer identifies which software application on a computer should receive the data transmission: True.

<h3>What is the transport layer?</h3>

The transport layer can be defined as one of the seven layers of the open systems interconnection (OSI) model and it is responsible for routing messages through an active computer network while selecting the best transmission path from the source to the destination device.

In Computer networking, a destination port number at the transport layer is saddled with the responsibility of identifying which software application on a computer should receive the data transmission.

Read more on transport layer here: brainly.com/question/26177113

#SPJ12

7 0
1 year ago
How to see how many words you have on google docs?
liberstina [14]
In the menu bar, click Tools > Word Count or hit Ctrl/Cmd + Shift + C.
4 0
3 years ago
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Other questions:
  • b. Suppose instead that Miller had written a routine to constantly change his assigned IP address to other addresses used by his
    8·1 answer
  • Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
    10·1 answer
  • Write a program that scores a blackjack hand. In blackjack, a player receives from two to five cards. (The player decides how ma
    5·1 answer
  • How would you define a relational database ?
    12·1 answer
  • If you need assistance with your I-20 which phone number at UC would you call?
    10·1 answer
  • Write a program to create a customer bill for a company. The company sells only five products: TV, DVD player, Remote Controller
    12·1 answer
  • Someone plz answer
    8·1 answer
  • Match each definition to the correct type of media.
    13·2 answers
  • Write a function named last_digit that returns the last digit of an integer. For example, last_digit(3572) should return 2. It s
    5·1 answer
  • What is your impression on the subject fundamentals of database systems?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!