1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
15

Will give brainliest!!!!!!!!

Computers and Technology
2 answers:
dolphi86 [110]3 years ago
7 0

Answer:

d the overall strength of colours

Explanation:

katrin2010 [14]3 years ago
6 0

Answer:

The answer is D. I am into photography and if you change the saturation, the strength of the colors in the photo recede or grow.

Explanation:

<em>I hope this helps! Please mark me brainliest!</em>

You might be interested in
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
Now the y0utube home screen is gone
erik [133]

Answer:

oh no thanks not good

Explanation:

did you try it on a different device mabye a phone

7 0
3 years ago
Read 2 more answers
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
What is cyber safety?
mario62 [17]

Answer: Cyber safety is a process that protects computers and networks. The cyber world is a dangerous place without security and protection.

Explanation: Hope this helps!

7 0
3 years ago
LILLE VIC LUNCUL ANCI.
tatiyna

The correct option is C. toward the floor.

The magnetic force on the moving negative charge acts towards the floor.

<u>Explanation</u>:

The direction of the force applied on the moving charged particle placed in the magnetic field can be determined with the help of Fleming’s Left hand rule.

The current flows in the direction opposite to the direction of electron. If the electron moves from negative terminal to positive terminal, then the current will flow from positive terminal to negative terminal.

As given, the direction of electron- South to North

So the direction of current will be- North to South

Using Fleming's Left hand rule we get the direction of force in downward direction, i.e. towards the floor.

5 0
3 years ago
Other questions:
  • A manufacturer of machine tools creates a spreadsheet of tools and the cost for those. The spreadsheet has four fields: name of
    13·1 answer
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    8·1 answer
  • In this website/app what are the points for?
    7·1 answer
  • Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
    6·1 answer
  • 2.36 LAB: Warm up: Variables, input, and casting (1) Prompt the user to input an integer, a double, a character, and a string, s
    12·1 answer
  • !WILL MARK BRAINLIEST!
    8·1 answer
  • The italic button is located on the
    6·1 answer
  • Help giving points mark BRAINLEST
    5·1 answer
  • CLICK ME IF U DARE hehehe
    10·2 answers
  • True or false, USBs are slower than RAM.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!