1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
7

"If possible, always bring print-outs of your slides for your audience

Computers and Technology
2 answers:
denis23 [38]3 years ago
6 0

Answer:

Answer is A I just take the quiz.

taurus [48]3 years ago
4 0
Why do I need a ty for me a couple days to
You might be interested in
Which element of color theory helps designers choose color schemes that create an appealing visual?
WITCHER [35]

Answer of this question is

C. Design

4 0
3 years ago
Read 2 more answers
Show the printout of the following code. public class Test { public static void main(String[] args) { double[][] m = {{1, 2, 3},
gtnhenbr [62]

Answer:

The answer to the given question is "3.6".

Explanation:

The printout description of the given java program can be given as:

In this program, the printout of the following code is 3.6. because in this program we define an array and assign elements on the array and calculate the sum of the elements but in the loop, we calculate the sum of rows value that is i [1][1]= 1.0, i [2][2]=2.5 and i [3][3]=0.1  then we calculate sum that is equal to 3.6.

That's why the answer to this question is "3.6".  

7 0
4 years ago
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
Svet_ta [14]

Answer:

C. SQL injection.

Explanation:

SQL is a relational database that is used by websites and web applications to hold data needed in the application. websites or applications with relational database like SQL are prone to SQL injection attacks.

SQL injection attacks are used to run malicious SQL statement to take control of the databases run by a website or application. With the vulnerability, an attacker can modify the content of a website's SQL database or can retrieve all data from it, after bypassing the security.

The data transmitted to the website or application from the fields in the datasheet can be manipulated or modified.

3 0
3 years ago
1. Open command prompt
icang [17]

Answer:

What do you want me to do

Explanation:

3 0
3 years ago
State and explain ten features of the standard toolbar as in computing.
Anastasy [175]

Answer:

Hi. I'm glad to help you.

Explanation:

1. New blank document: It helps the user to create a new blank document or sheet.

2. Open: It allows the user to open or find a file.

3. Search: It is used to find files, folders and webpages.

4. Cut: It removes the current selection to the clipboard.

5. Copy: It copies the selection to the clipboard.

6. Print preview: It shows how a file will look like when printed.

7. Insert hyperlink: This command allows the user to insert a new hyperlink or edit the selected hyperlink.

8. Zoom: Adjusts the size that the document appears on the screen.

9. Document Map: It displays the document map for the current document.

10. Format Painter: It copies the cell format allowing it be pasted elsewhere.

<em><u>Hope it helps. Please mark as brainliest. </u></em>

4 0
3 years ago
Read 2 more answers
Other questions:
  • Consider a set of mobile computing clients in a certain town who each
    13·1 answer
  • Which is better to use for cleaning electronics, Ethyl alcohol vs isopropyl alcohol?
    14·1 answer
  • If, instead, charge 3 is located to the left of charge 1 at a point (on the x axis) that satisfies the conditions given in the p
    7·1 answer
  • Assume that a picture is represented on a monitor screen by a rectangular array containing 2048 columns and 1536 rows of pixels.
    12·1 answer
  • QUESTION: Which is not an example of a video port or cable?
    10·1 answer
  • I will mark brainillist if someone answers Donethkm question its How can a Word user insert a page break into a document to isol
    11·2 answers
  • How does one select an entrepreneurial activity?
    9·1 answer
  • Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
    15·1 answer
  • You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
    15·1 answer
  • Help me with this someone hurry due in 8 mins
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!