1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
3 years ago
8

True or false = the order of cannot be changed in slide shorter view ,true or false =menu bar is located just below the title ba

r plz solve thisss​
Computers and Technology
2 answers:
Karolina [17]3 years ago
5 0
True
Bbbhjhhhcghnbfyujvff
DIA [1.3K]3 years ago
3 0

Answer:

True or false = the order of cannot be changed in slide shorter view ,true or false =menu bar is located just below the title bar plz solve thisss

You might be interested in
A look to different section of the same page is known as_____.
11Alexandr11 [23.1K]

Answer:

hatdoggggggggg

Explanation:

sunoggggggg

6 0
3 years ago
I need the answers. i don’t get this
bixtya [17]
Run,lazy,turtles,slow,wandering, jump,45,weird,pigs, cows, cousins, pale,rude,candles

There are many answers for this but this is what first came to my mind

Hope this helps
4 0
3 years ago
GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
rodikova [14]

Answer:

enterprise architecture

Explanation:

Based on the information provided within the question it can be said that in this scenario GenXTech seems to be creating an enterprise architecture. This is a blueprint that completely detail the structure and different operations within an organization, with the main focus of how the organization can best achieve it's objective. Which is what GenXTech is trying to do by analyzing it's situation.

4 0
3 years ago
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
A systems flowchart:
Musya8 [376]

Answer: (D)  Must always have a data store if there are paper documents involved.

Explanation:

 A system flowchart is basically responsible for displaying the data in the system and also control the flow of data. The system flowchart are basically use various graphic symbol for representing the systematic manner for processing the output.

It basically contain data store in the system if there is data documents present in the system so that it make easy to store the data in the system.

There are basically four symbols that is use to represent in the program flowchart is that are: Firstly start, processing, decision making and then end.

6 0
3 years ago
Other questions:
  • Which area of the network would a college it staff most likely have to redesign as a direct result of many students bringing the
    10·1 answer
  • The Transmission Control Protocol (TCP) splits each message into multiple packets. It's possible for packets from the same messa
    10·1 answer
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessar
    6·1 answer
  • Narrowband Satellite Communications supports ______________ data rates for both mobile and fixed users by providing access on a
    8·1 answer
  • Which CSS attribute would change an element's font color to blue? font-color: blue; background: blue; color: blue; background-co
    10·2 answers
  • Jared recently sent an email to all the members of his department asking them for their opinions about where the department shou
    11·1 answer
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
    7·1 answer
  • missy just hired a software development team to create an educational simulation app for a high school course. she has specific
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!