1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
15

JOIN GO.OGLE CLASSROOM IF YOUR A FAN OF FRANK OCEAN

Computers and Technology
2 answers:
Alex777 [14]3 years ago
7 0
Yes i agree perfectly too
Mrrafil [7]3 years ago
3 0
Yes i agree perfectly
You might be interested in
Jody should select the
Alex Ar [27]

Answer:

In the View tab, you will find Zoom Option. Set the Zoom level to 100%.

Explanation:

You need to set the Zoom level to 100%, And you can do this, by setting the zoom level to 100%, from the scroll bar. Or you can move to view tab in the main menu, and then in the Ribbon, you need to select the zoom % and set it to 100 percent. You will then be able to see the entire page. And if you want, you can increase the Zoom level to even further, for getting an even more clearer picture.

3 0
4 years ago
Consider a student club or organization in which you are a
lakkis [162]

Answer:

Entity Relationship Diagram (ERD):

An ERD is an abstract data model to represent real world entities and their relationship to each other. ERD data schemas are used to define what data is important to processes in graphical form.

4 0
2 years ago
________ is a function that removes specific identifying information from query results, such as last name and telephone number,
Musya8 [376]

Answer: Anonymization

Explanation: Anonymization is the mechanism followed on the data for it's security. It is the process in which the data is eliminated on the basis that it is particularly identifiable by the features like last name and other specific features. It is also done by the encryption technique to protect the information. The data that has been specifically identified are specified as anonymous.

4 0
4 years ago
Wlan security based on a psk technology is called ________ mode.
ella [17]
It is called personal mode

Instead of having devices in a WLAN configured with the same PSK, we can use a more scalable approach of requiring all users to authenticate using their own credentials, for instance, a username and a password. Allowing this prevents compromising a single password from impacting configuration of all devices connected wirelessly.



4 0
3 years ago
Which manufacturing industry makes semiconductors that are used in a variety of systems?
aleksley [76]
Transportation equipment
7 0
3 years ago
Other questions:
  • Privileged instructions 1) generate an interrupt so they can execute before non-privileged instructions. 2) are valid only when
    5·1 answer
  • What were the first microblogs known as
    12·2 answers
  • Which of the following is the final fate for average sized stars?
    12·1 answer
  • Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Whic
    13·2 answers
  • The amount of data produced worldwide is increasing by ___% each year.
    5·1 answer
  • Which line is not a computer-generated forecast?Which line is not a computer-generated forecast?the black line representing 20th
    12·1 answer
  • When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the
    6·2 answers
  • 1. If this traffic signal is turned on after the red light, it means you may cross the intersection, but you _______ wait until
    12·2 answers
  • Your friend decides to create a spreadsheet containing vocabulary terms and their definitions to help prepare for the unit test
    5·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!