1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
2 years ago
12

How do i take off securly from my chromebook

Computers and Technology
2 answers:
tatuchka [14]2 years ago
7 0

Answer:

DONT GO TO THAT WEBSITE!!!!!!

lidiya [134]2 years ago
6 0

Answer: To uninstall the Securly SSL certificate from your ChromeOS go to chrome://settings -> Advanced -> Manage Certificates -> Authorities. Look for the Securly SSL certificate in there and click “Delete”. This should delete the certificate from your Chromebook or another ChromeOS device

Explanation:

You might be interested in
Name the box where the name of the first cell of the selected range appears?
sergey [27]

Answer:

Name box

Explanation:

From the picture, the name box is at the top left corner with B1 written inside, here B1 is written because it is the active cell at the time which also happens to be the first cell of the selected range. The name box can be used to easily create a named ranges rather Than having to draw the mouse over a group of cells. It also helps to know which cell is the current active cell as the cell address in the name box is the active cell at any point in time.

4 0
2 years ago
Describe the purpose of working directory and how it can be speed or slow file access
Cloud [144]

Explanation:

The working directory is just a file path on your computer that sets the default location of any files you read. If you want to read a file 'file.txt'.

6 0
1 year ago
Derek has an interest in designing video games. What requirements should he fulfill to be a game designer? To be a game designer
4vir4ik [10]

Answer:

2. Marketing, communication or advertising

Explanation:

5 0
2 years ago
What is a problem? Give an example of abusiness problem and discuss how acomputer-based information system couldsolve it.
Naily [24]

Answer:

A problem is a challenging task or process that needs resources not available to the individual or group responsible for the task.

An example of a business problem is data analysis.

Explanation:

A business enterprise is driven by profit making. Investing in a business opportunity requires or demands for feasibility study. Without the right computer skills, a company dives into various physical forms of survey like giving questionnaires to potential clients.

This form of survey requires a lot of time and money that should be invested in other assets in the company and the data acquired, sometimes  is not enough to make long term business decisions.

On the other hand, when a spreed sheet application is used (like microsoft excel) by a business data analyst with big data and data visualization skills, large data could be accessed online and analysed of a fast and efficient descriptive and predictive analysis for long term business decisions.

7 0
3 years ago
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
2 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
    9·1 answer
  • What is the correct order of network types when categorized by their size or the physical area they cover, from largest to small
    10·1 answer
  • You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
    11·1 answer
  • Why is it important for software developers to study Human-Computer Interaction? to make sure a user interface is easy to use, w
    10·2 answers
  • What part of the code is a signal for the function to execute and pass back a value?
    11·2 answers
  • Mrs. Jackson wrote a newsletter to the customers of her housecleaning business that included some organizational tips they could
    8·2 answers
  • ________ programming is a method of writing software that centers on the actions that take place in a program.
    8·1 answer
  • Charts are more effective in attaining attentionthen others methods of presenting data. Do you agree?
    10·1 answer
  • Which folder does the ipad saves my pictures?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!