1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
13

Do you know how to change your grades on a printer???????????

Computers and Technology
1 answer:
BabaBlast [244]3 years ago
5 0

Answer:

To change ur grade make sure to do it on the website first by right clicking your mouse and clicking inspect element and once done changing x out and it will save

Explanation:

You might be interested in
Repetition learning rates are the same for everyone, so there is no need to find an activation and break pattern that works
Leviafan [203]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
To add a glow effect to WordArt text, which of the following should be done?
g100num [7]
Number 2 is the correct answer
8 0
3 years ago
Keegan has a hard drive that he wants to connect externally to his laptop. Which two ports can he connect the external hard driv
Marianna [84]

Answer:

,홀로 ㅛㅍㅍ 내 ㅍ. 냐 ㅑㅇㄹ ㅑ 덮고 ㅇ ㅗㅗ묙 ㅗㄴ ㄴ

Explanation:

소 묘 뉴 ㅕㅁ ㅣ 홈 ㅛ ㅑㅍㄴ. ㅕ 이 ㅕㅁ ㅛ ㅁ 포 ㅛ ㄴ ㅕ 여 あか

8 0
2 years ago
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat
antiseptic1488 [7]

Answer:

The tool that allows to configure a custom console is "mmc.exe".

Explanation:

MMC is a Microsoft Management Console. It is used to customize the management console and add the tools in console that are required by the technician.

3 0
3 years ago
Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is
Harlamova29_29 [7]

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

6 0
3 years ago
Other questions:
  • Select all that apply.
    8·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an
    15·1 answer
  • At age 16 Cheyanne just got her drivers license
    5·2 answers
  • How does the purchase of office equipment on account affect the accounting equation?
    11·2 answers
  • Write a program that scores a blackjack hand. In blackjack, a player receives from two to five cards. (The player decides how ma
    5·1 answer
  • Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preforma
    8·2 answers
  • A computer consists of both software and hardware. a)Define the term software​
    5·1 answer
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • Describe a NIC card and can you have more than one?
    13·1 answer
  • Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!